CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday revealed that Commvault is monitoring cyber threat activity targeting applications hosted in their Microsoft Azure cloud environment. “Threat actors may have accessed client secrets for Commvault’s (Metallic) Microsoft 365 (M365) backup software-as-a-service (SaaS) solution, hosted in Azure,” the agency said. “This provided the threat actors…

Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics

Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics

Russian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology companies since 2022. The activity has been assessed to be orchestrated by APT28 (aka BlueDelta, Fancy Bear, or Forest Blizzard), which is linked to the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center, Military…

Do Higher Content Scores Mean Higher Google Rankings? We Studied It (So You Don’t Have To)
|

Do Higher Content Scores Mean Higher Google Rankings? We Studied It (So You Don’t Have To)

Built within these scores is an implicit assumption that the higher your score, the higher you’ll likely rank on Google. But is that actually true? To find out, I studied the correlation between rankings and content scores from five content optimization tools: Surfer, Frase, NeuronWriter, Clearscope, and our own AI Content Helper. We found weak…

The AI Bots That ~140 Million Websites Block the Most
|

The AI Bots That ~140 Million Websites Block the Most

AI bots power some of the most advanced technologies we use today, from search engines to AI assistants. However, their increasing presence has led to a growing number of websites blocking them. There’s a cost to bots crawling your websites and there’s a social contract between search engines and website owners, where search engines add…

Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery

Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery

A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, including Amazon S3 buckets and Microsoft Azure endpoints, by leveraging misconfigurations in the Domain Name System (DNS) records. The hijacked domains are then used to host URLs that direct users to scams and malware via traffic distribution systems…

RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

The official site for RVTools has been hacked to serve a compromised installer for the popular VMware environment reporting utility. “Robware.net and RVTools.com are currently offline. We are working expeditiously to restore service and appreciate your patience,” the company said in a statement posted on its website. “Robware.net and RVTools.com are the only authorized and…

74% of New Webpages Include AI Content (Study of 900k Pages)
|

74% of New Webpages Include AI Content (Study of 900k Pages)

We analyzed 900,000 newly created web pages in April 2025 and found that 74.2% of them contained AI-generated content. At Ahrefs, our machine learning team has built an AI content detector (codenamed bot_or_not). We’re about to release the AI content detector for Ahrefs customers to use, so we decided to put it through its paces…

Insights From 55.8M AI Overviews Across 590M Searches—A Study by Ahrefs
|

Insights From 55.8M AI Overviews Across 590M Searches—A Study by Ahrefs

According to Google, AI Overviews (AIOs) had over 1.5 billion users a month in Q1 2025. That would be 18.3% of all the people on the planet or 26.6% of all internet users. That’s a massive reach. In traditional Ahrefs fashion, I wanted to do the largest data study ever done on AIOs to see…

[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications

[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications

Modern apps move fast—faster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan code in isolation, react late to cloud threats, and monitor SOC alerts only after damage is done. Attackers don’t wait. They exploit vulnerabilities within hours. Yet most organizations take days…