Rules File Backdoor: AI Code Editors exploited for silent supply chain attacks

1 year ago

The Rules File Backdoor attack targets AI code editors like GitHub Copilot and Cursor, making them inject malicious code via…

U.S. CISA adds Fortinet FortiOS/FortiProxy and GitHub Action flaws to its Known Exploited Vulnerabilities catalog

1 year ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Fortinet FortiOS/FortiProxy and GitHub Action flaws to its Known Exploited Vulnerabilities catalog. The U.S.…

Nation-state actors and cybercrime gangs abuse malicious .lnk files for espionage and data theft

1 year ago

11 state-sponsored APTs exploit malicious .lnk files for espionage and data theft, with ZDI uncovering 1,000 such files used in…

ChatGPT SSRF bug quickly becomes a favorite attack vector

1 year ago

Threat actors exploit a server-side request forgery (SSRF) flaw, tracked as CVE-2024-27564, in ChatGPT, to target US financial and government…

GitHub Action tj-actions/changed-files was compromised in supply chain attack

1 year ago

The GitHub Action tj-actions/changed-files was compromised, enabling attackers to extract secrets from repositories using the CI/CD workflow. Researchers reported that…

New StilachiRAT uses sophisticated techniques to avoid detection

1 year ago

Microsoft discovered a new remote access trojan (RAT), dubbed StilachiRAT, that uses sophisticated techniques to avoid detection. In November 2024,…

Threat actors rapidly exploit new Apache Tomcat flaw following PoC release<gwmw style="display:none;"></gwmw>

1 year ago

Threat actors began exploiting a recently disclosed Apache Tomcat vulnerability immediately after the release of a PoC exploit code. A…

Attackers use CSS to create evasive phishing messages

1 year ago

Threat actors exploit Cascading Style Sheets (CSS) to bypass spam filters and detection engines, and track users’ actions and preferences. …

Researcher releases free GPU-Based decryptor for Linux Akira ransomware

1 year ago

A researcher released a free decryptor for Linux Akira ransomware, using GPU power to recover keys through brute force. Security…

Denmark warns of increased state-sponsored campaigns targeting the European telcos

1 year ago

Denmark 's cybersecurity agency warns of increased state-sponsored campaigns targeting the European telecom companies Denmark raised the cyber espionage threat…

This website uses cookies.