Defending against database ransomware attacks
How attackers exploit exposed databases for extortion—and the defenses that work.
Hila is a threat hunting researcher at Wiz, where she focuses on identifying and investigating malicious behaviors across cloud environments. Her work focuses on uncovering misconfigurations, privilege abuse, and identity-based threats to support proactive detection and incident response.
How attackers exploit exposed databases for extortion—and the defenses that work.
When common processes start asking the wrong questions
A deeper look at the npm debug/chalk supply-chain incident: deobfuscating the wallet-hijacking browser interceptor, quantifying the ~2-hour exposure with Wiz telemetry (~99% package prevalence, ~10% malware presence), and unpacking what made it spread so fast.
Exposed cloud credentials become the launchpad for mass phishing, highlighting email services as a prime target in cloud exploitation campaigns.
Detect and mitigate CVE-2025-53770 and CVE-2025-53771 - critical vulnerabilities in Microsoft SharePoint Server currently under active exploitation.