Technology

Amaranth-Dragon exploiting a WinRAR flaw shows how fast espionage actors weaponize public bugs

A “new” espionage actor name doesn’t matter on its own. What matters is the operating pattern: how quickly a group can weaponize a newly disclosed bug, what that says about the defender’s patch window, and what kinds of organizations are being singled out. Reporting and published research describe a threat actor dubbed Amaranth-Dragon, assessed as […]

Amaranth-Dragon exploiting a WinRAR flaw shows how fast espionage actors weaponize public bugs Read More »

Non-human identities are a breach engine: why tokens and service accounts keep getting exposed

Non-human identities—API keys, tokens, service accounts, workload identities—are now one of the easiest ways into modern cloud environments. Not because attackers suddenly became geniuses, but because organizations increasingly run on machine-to-machine trust, and that trust is often overbroad, long-lived, and poorly monitored. A new analysis highlighted in reporting points to a familiar pattern at huge

Non-human identities are a breach engine: why tokens and service accounts keep getting exposed Read More »

n English