Tag AWS

Active Exploitation of React2Shell Vulnerability for Linux Backdoor Deployment

A significant security vulnerability known as React2Shell is currently being exploited by cybercriminals to deploy various malware strains, including KSwapDoor and ZnDoor, as reported by Palo Alto Networks’ Unit 42 and NTT Security. The exploitation of this vulnerability poses urgent risks to organizations, particularly those leveraging React and Next.js frameworks.…

Read MoreActive Exploitation of React2Shell Vulnerability for Linux Backdoor Deployment

New Menlo Security CEO Focuses on Agentic AI Runtime Protection

Artificial Intelligence & Machine Learning, Data Security, Next-Generation Technologies & Secure Development Former Mandiant Executive Bill Robbins Aims to Advance Browser-Based AI Security Michael Novinson (MichaelNovinson) • February 27, 2026 Bill Robbins, CEO, Menlo Security (Image: Menlo Security) Menlo Security has appointed Bill Robbins, a seasoned leader from Mandiant, as…

Read MoreNew Menlo Security CEO Focuses on Agentic AI Runtime Protection

AI-Powered Hacking Campaign Compromises Over 600 Fortinet Devices

Cybersecurity Update: AI-Powered Attack on Fortinet Firewalls and Other Breaches In a recent development in the cybersecurity landscape, a financially motivated threat actor, reportedly Russian-speaking, has leveraged commercial AI toolkits to compromise over 600 Fortinet firewalls. This operation was first identified by the AWS security team, indicating that the activity…

Read MoreAI-Powered Hacking Campaign Compromises Over 600 Fortinet Devices

Serious Attacks May Have Been Orchestrated via Vulnerability in Amazon ECR Public Gallery

A serious vulnerability has been uncovered in the Amazon Elastic Container Registry (ECR) Public Gallery, which could have been leveraged for various attacks, as reported by the cybersecurity firm Lightspin. The flaw poses critical risks, enabling malicious actors to delete images stored in the gallery or replace them with versions…

Read MoreSerious Attacks May Have Been Orchestrated via Vulnerability in Amazon ECR Public Gallery

AWS Credentials Breach: AI-Driven Attack Unfolds in Just 8 Minutes

AI-Directed Cloud Breach Following Exposed AWS Credentials in Just 8 Minutes Notice: Function WP_Scripts::add was called incorrectly. The script with the handle “powerkit” was enqueued with dependencies that are not registered: tippy. Please see Debugging in WordPress for more information. (This message was added in version 6.9.1.) in on…

Read MoreAWS Credentials Breach: AI-Driven Attack Unfolds in Just 8 Minutes

Groups Caution That $32B Google-Wiz Deal Poses Risks to Cloud Competition

Cloud Security, Regulation, Security Operations Civil Society Organizations Express Concerns Over Potential Impact of Google-Wiz Deal on Cloud Security Michael Novinson (@MichaelNovinson) • January 30, 2026 A coalition of civil society organizations has voiced significant concerns regarding Google’s proposed acquisition of Wiz, arguing that it could severely diminish competition in…

Read MoreGroups Caution That $32B Google-Wiz Deal Poses Risks to Cloud Competition

Outtake Secures $40M to Expand Automated Threat Response Technology

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development, Threat Detection Agents Enhance Digital Risk Protection and Open-Source Intelligence in Regulated Environments Michael Novinson (MichaelNovinson) • January 29, 2026 Alex Dhillon, founder and CEO of Outtake (Image: Outtake) A startup founded by a former Palantir engineer has secured $40…

Read MoreOuttake Secures $40M to Expand Automated Threat Response Technology