Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: exposed Clear Filter

SonicWall warns customers to reset credentials after breach

SonicWall warned customers today to reset credentials after their firewall configuration backup files were exposed in a security breach that impacted MySonicWall accounts. After detecting the incident, SonicWall has cut off the attackers' access to its systems and has been collaborating with cybersecurity and law enforcement agencies to investigate the attack's impact. "As part of our commitment to transparency, we are notifying you of an incident that exposed firewall configuration backup fil

Shadow IT Is Expanding Your Attack Surface. Here’s Proof

Shadow IT - the systems your security team doesn’t know about - is a persistent challenge. Policies may ban them, but unmanaged assets inevitably slip through. And if defenders don’t uncover them first, there’s always a risk attackers will. With just a few days of effort, Intruder’s security team uncovered multiple real-world examples of Shadow IT exposures: unsecured backups, open Git repositories, unauthenticated admin panels, and more. Every one of them contained highly sensitive data or cr

Free Autoswagger Tool Finds the API Flaws Attackers Hope You Miss

APIs: Still Easy Targets in 2025 APIs are the backbone of modern applications - and one of the most exposed parts of an organization’s infrastructure. This makes them a prime target for attackers. One of the highest-profile examples was the Optus breach in 2022, where attackers stole millions of customer records through an unauthenticated API endpoint - costing the telecom company $140 million AUD in fallout. Worryingly, vulnerabilities like this are so easy to exploit you could teach someone

Free Tool Autoswagger Finds The API Flaws Attackers Hope You Miss

APIs: Still Easy Targets in 2025 APIs are the backbone of modern applications - and one of the most exposed parts of an organization’s infrastructure. This makes them a prime target for attackers. One of the highest-profile examples was the Optus breach in 2022, where attackers stole millions of customer records through an unauthenticated API endpoint - costing the telecom company $140 million AUD in fallout. Worryingly, vulnerabilities like this are so easy to exploit you could teach someone

Cybercrime forum Leak Zone publicly exposed its users’ IP addresses

A self-styled “leaking and cracking forum” where users advertise and share breached databases, stolen credentials, and pirated software was leaking the IP addresses of its logged-in users to the open web, security researchers have found. Leak Zone left an Elasticsearch database exposed to the internet without a password, according to researchers at UpGuard. In a blog post shared with TechCrunch ahead of its publication, the researchers said they discovered the database on July 18 and found its

Shattering the rotation illusion: The attacker view and AWSKeyLockdown (2024)

PDF Report Shattering the Rotation Illusion: How Quickly Leaked AWS Keys are Exploited Download Now -> Through the Attacker’s Eyes: A New Era of NHI Security This final installment in our blog series brings together everything we’ve uncovered about leaked AWS Access Keys—how attackers exploit them, why traditional security measures fall short, and what organizations can do to protect themselves. Over the series, we explored real-world scenarios across various platforms: GitHub and GitLab, Pac

Shattering the Rotation Illusion: The Attacker View & AWSKeyLockdown

PDF Report Shattering the Rotation Illusion: How Quickly Leaked AWS Keys are Exploited Download Now -> Through the Attacker’s Eyes: A New Era of NHI Security This final installment in our blog series brings together everything we’ve uncovered about leaked AWS Access Keys—how attackers exploit them, why traditional security measures fall short, and what organizations can do to protect themselves. Over the series, we explored real-world scenarios across various platforms: GitHub and GitLab, Pac

Exposed MCP servers across the internet

Knostic’s research team conducted a systematic study to locate exposed MCP servers on the internet. Leveraging Shodan and custom Python tools, we fingerprinted and mapped production MCP servers. All servers we discovered were insecure and revealed their capabilities to anyone asking. In this series of posts, we are sharing our findings, along with a guide detailing how we fingerprinted MCP servers. We identified a total of 1,862 MCP servers exposed to the internet. From this set, we manually v

Exposing the Unseen: Mapping MCP Servers Across the Internet

Knostic’s research team conducted a systematic study to locate exposed MCP servers on the internet. Leveraging Shodan and custom Python tools, we fingerprinted and mapped production MCP servers. All servers we discovered were insecure and revealed their capabilities to anyone asking. In this series of posts, we are sharing our findings, along with a guide detailing how we fingerprinted MCP servers. We identified a total of 1,862 MCP servers exposed to the internet. From this set, we manually v

The latest threat from the rise of Chinese manufacturing

If in retrospect all that seems obvious, it’s only because the research by David Autor, an MIT labor economist, and his colleagues has become an accepted, albeit often distorted, political narrative these days: China destroyed all our manufacturing jobs! Though the nuances of the research are often ignored, the results help explain at least some of today's political unrest. It’s reflected in rising calls for US protectionism, President Trump’s broad tariffs on imported goods, and nostalgia for t

Healthcare SaaS firm says data breach impacts 5.4 million patients

Episource warns of a data breach after hackers stole health information of over 5 million people in the United States in a January cyberattack. Episource is an American healthcare services company that provides risk adjustment, medical coding, data analytics, and technology solutions to health plans and providers. They help insurers optimize payments and compliance in government programs like Medicare Advantage. In a data breach notification on its website, Episource says it detected unusual a

Brute-force attacks target Apache Tomcat management panels

A coordinated campaign of brute-force attacks using hundreds of unique IP addresses targets Apache Tomcat Manager interfaces exposed online. Tomcat is a popular open-source web server widely used by large enterprises and SaaS providers, while Tomcat Manager is a web-based administration tool that comes bundled with the Tomcat server and helps admins manage deployed web apps via a graphical interface. Tomcat Manager is configured by default to only allow access from localhost (127.0.0.1), with