Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

API Security Failures: What Went Wrong at Dell & Twilio? #APIBreach #DataLeak #DellHack

Major companies like Dell and Twilio suffered API breaches due to poor validation, broken access control, and missing rate limits. Dell’s 49M records were exposed at 5000 requests per minute, while Twilio’s API leak allowed attackers to validate accounts. Learn how insecure API views lead to massive data breaches—and how to protect your APIs.

March 10, 2025 Cyber Threat Intelligence Briefing

March 10, 2025 Cyber Threat Intelligence Briefing This week’s briefing covers: BLACK BASTA Affiliates Linked to CACTUS Ransomware Researchers have linked CACTUS ransomware tactics to former affiliates of BLACKBASTA, noting the use of similar tools and techniques. CACTUS employs the BackConnect (BC) module for persistent control over infected systems, allowing for data theft and remote command execution.

HUNTUBS Ransomware Attack on Tata Technologies: A Major Cybersecurity Breach

Cybersecurity incidents continue to make headlines, with the latest victim being Tata Technologies, a leading global engineering and technology services company. The HUNTUBS ransomware group has claimed responsibility for a major attack, leaking sensitive corporate data. The incident, which resulted in the theft of 1.4 TB of confidential data, has raised concerns about cybersecurity resilience among major enterprises.

Lazarus Group Strikes Again: North Korean Hackers Steal $1.46 Billion in Bybit Crypto Heist

Lazarus Group Strikes Again: North Korean Hackers Steal $1.46 Billion in Bybit Crypto Heist In recent weeks, the cryptocurrency community has been rocked by a series of high-profile thefts, including a $1.46 billion suspicious outflow from Bybit, a $11.5 million Coinbase social engineering scam, and an XRP laundering attempt linked to North Korea. Blockchain investigator ZachXBT has been actively tracking these incidents, mapping the stolen funds' movement across multiple chains.

Identify gaps to strengthen detection coverage with the Datadog Cloud SIEM MITRE ATT&CK Map

Security analysts need clear visibility into potential threats to proactively defend against cyberattacks. Defining these threats can be challenging, but many security teams rely on the MITRE ATT&CK framework as a foundational resource for strengthening their defenses. While security platforms tag detections with MITRE ATT&CK tactics and techniques, analysts often struggle to assess their overall coverage across different attack surfaces.

CVE-2025-1094: SQL Injection Vulnerability in PostgreSQL's Escaping Functions

CVE-2025-1094 presents a critical challenge to established SQL security paradigms, effectively circumventing fundamental best practices. Though initially reported over a month ago, the gravity of its implications warrants an extensive analysis. This vulnerability challenges the long-held assumption that proper escaping guarantees protection against SQL injection attacks.

Introducing dark web insights to Outpost24's EASM platform

We’re pleased to announce that a new Digital Risk Protection (DRP) integration has been added to Outpost24’s External Attack Surface management (EASM) platform: the Dark Web module. Security teams need complete visibility on their organization’s exposure and potential threats. This doesn’t only include your owned online assets, but also your dark web presence.