Experts found 10 malicious packages on PyPI used to steal developers’ data

3 years ago

10 packages have been removed from the Python Package Index (PyPI) because they were found harvesting data. Check Point researchers…

Hackers behind Twilio data breach also targeted Cloudflare employees

3 years ago

Cloudflare revealed that at least 76 employees and their family members were targeted by smishing attacks similar to the one…

CISA adds UnRAR and Windows flaws to Known Exploited Vulnerabilities Catalog

3 years ago

US Critical Infrastructure Security Agency (CISA) adds vulnerabilities in the UnRAR utility to its Known Exploited Vulnerabilities Catalog. The Cybersecurity…

VMware warns of public PoC code for critical auth bypass bug CVE-2022-31656

3 years ago

VMware warns of the availability of a proof-of-concept exploit code for a critical authentication bypass flaw in multiple products. VMware…

Microsoft Patch Tuesday for August 2022 fixed actively exploited zero-day

3 years ago

Microsoft Patch Tuesday security updates for August 2022 addressed a zero-day attack remote code execution vulnerability in Windows. Microsoft Patch…

Experts linked Maui ransomware to North Korean Andariel APT

3 years ago

Cybersecurity researchers from Kaspersky linked the Maui ransomware to the North Korea-backed Andariel APT group. Kaspersky linked with medium confidence…

Chinese actors behind attacks on industrial enterprises and public institutions

3 years ago

China-linked threat actors targeted dozens of industrial enterprises and public institutions in Afghanistan and Europe. In January 2022, researchers at…

US sanctioned crypto mixer Tornado Cash used by North Korea-linked APT

3 years ago

The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned the crypto mixer service Tornado Cash used by North…

Malicious file analysis – Example 01

3 years ago

Cyber Security Specialist Zoziel Pinto Freire shows an example of malicious file analysis presented during his lecture on BSides-Vitória 2022.…

Orchard botnet uses Bitcoin Transaction info to generate DGA domains

3 years ago

Experts spotted a new botnet named Orchard using Bitcoin creator Satoshi Nakamoto's account information to generate malicious domains. 360 Netlab…

This website uses cookies.