Analysis of UNC6032’s Facebook and LinkedIn ad blitz shows social-engineered ZIPs leading to multi-stage Python and DLL side-loading toolkits
The vulnerability affects many versions of Ivanti appliances and is being exploited by a Chinese actor
Security researchers found a way to exfiltrate internal binaries and proto files from Google Gemini's Python sandbox—without breaking out of it.
Discover how attackers exploit Google Cloud Build to execute malicious actions, and learn which log events security teams should monitor to detect and prevent cloud-based threats.