Large-Scale Operation Steals Cloud Credentials from Exposed Git Repositories
https://sysdig.com/blog/emeraldwhale A large-scale cyber operation named “EmeraldWhale” has compromised thousands of private repositories by exploiting exposed Git configuration files. Hackers used automated tools to scan a massive range of IP addresses...
Your Site Was Hacked, and You Never Knew About It: My Real-Life Encounter with a Supply Chain Attack
Just yesterday, I received a LinkedIn message about an interesting job opportunity, complete with a link to the job ad. Before clicking, I took a quick look at the URL to ensure it was legitimate—something we all do in this line of work. The website appeared normal...Fake Browser Update Malware Targets WordPress Sites via Malicious Plugins
https://www.bleepingcomputer.com/news/security/over-6-000-wordpress-sites-hacked-to-install-plugins-pushing-infostealers WordPress website owners beware! A new wave of attacks is targeting your sites to install malicious plugins that display fake software updates and...