Aggregator
资料下载 | 保守国家秘密法实施条例、电力监控系统安全防护规定
安全419企业探营 | 走进观安信息
恶意PyPI 包针对 macOS,窃取谷歌云凭据
卡巴斯基:美国拒绝由第三方审计代码的提案
从乔布斯到李昌钰:如何破解数智迷航?
Олимпиада-2024: между свободой и тотальным контролем
Malicious Python Package Attacking macOS Developers To Steal Google Cloud Logins
Hackers continuously exploit malicious Python packages to attack developer environments and inject harmful code that enables them to steal sensitive information, install malware, or create backdoors. The method takes advantage of the widely-used repositories for packaging consequently creating a widespread impact with minimum effort from the attackers. Cybersecurity researchers at CheckMarx recently identified that threat […]
The post Malicious Python Package Attacking macOS Developers To Steal Google Cloud Logins appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
ИИ-звонки и Android-приложения: GXC Team обманывает клиентов испанских банков
Уязвимость в WhatsApp позволяет бесшумно запускать вредоносные скрипты Python и PHP
PICO交互感知团队 - 可控3D版生成来袭:Coin3D实现三维可控的物体生成
DeadSec CTF 2024 writeup by Mini-Venom
Beware of fake AI tools masking very real malware threats
US Crypto Exchange Gemini Reveals Breach
Хакеры на ИИ-допинге: Symantec бьёт тревогу, фиксируя всплеск продвинутых кибератак
使用KAPE自动化采集并分析Windows取证数据
PKfail, Critical Firmware Supply-Chain Issue Let Attackers Bypass Secure Boot
Hackers often attack secure boot during the boot process to execute unauthorized code, which gives them the ability to bypass a system’s security measures. By compromising Secure Boot, they can install rootkits and malware at a low level, gaining persistent control over the system and evading traditional security defenses. The Binarly Research Team discovered a […]
The post PKfail, Critical Firmware Supply-Chain Issue Let Attackers Bypass Secure Boot appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Attacking Users Searching For W2 Form
A malicious campaign emerged on June 21, 2024, distributing a JavaScript file hosted on grupotefex.com, which executes an MSI installer, subsequently dropping a Brute Ratel Badger DLL into the user’s AppData. The command-and-control framework Brute Ratel then downloads and inserts the stealthy Latrodectus backdoor, which gives threat actors remote control, the ability to steal data, […]
The post Hackers Attacking Users Searching For W2 Form appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.