Aggregator
Malicious Python Package Attacking macOS Developers To Steal Google Cloud Logins
Hackers continuously exploit malicious Python packages to attack developer environments and inject harmful code that enables them to steal sensitive information, install malware, or create backdoors. The method takes advantage of the widely-used repositories for packaging consequently creating a widespread impact with minimum effort from the attackers. Cybersecurity researchers at CheckMarx recently identified that threat […]
The post Malicious Python Package Attacking macOS Developers To Steal Google Cloud Logins appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
ИИ-звонки и Android-приложения: GXC Team обманывает клиентов испанских банков
Уязвимость в WhatsApp позволяет бесшумно запускать вредоносные скрипты Python и PHP
PICO交互感知团队 - 可控3D版生成来袭:Coin3D实现三维可控的物体生成
DeadSec CTF 2024 writeup by Mini-Venom
Beware of fake AI tools masking very real malware threats
US Crypto Exchange Gemini Reveals Breach
Хакеры на ИИ-допинге: Symantec бьёт тревогу, фиксируя всплеск продвинутых кибератак
使用KAPE自动化采集并分析Windows取证数据
PKfail, Critical Firmware Supply-Chain Issue Let Attackers Bypass Secure Boot
Hackers often attack secure boot during the boot process to execute unauthorized code, which gives them the ability to bypass a system’s security measures. By compromising Secure Boot, they can install rootkits and malware at a low level, gaining persistent control over the system and evading traditional security defenses. The Binarly Research Team discovered a […]
The post PKfail, Critical Firmware Supply-Chain Issue Let Attackers Bypass Secure Boot appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Attacking Users Searching For W2 Form
A malicious campaign emerged on June 21, 2024, distributing a JavaScript file hosted on grupotefex.com, which executes an MSI installer, subsequently dropping a Brute Ratel Badger DLL into the user’s AppData. The command-and-control framework Brute Ratel then downloads and inserts the stealthy Latrodectus backdoor, which gives threat actors remote control, the ability to steal data, […]
The post Hackers Attacking Users Searching For W2 Form appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
上周关注度较高的产品安全漏洞(20240722-20240728)
CNVD漏洞周报2024年第30期
North Korean Onyx Sleet Using Group Of Malware And Exploits to Gain Intelligence
Onyx Sleet, a cyber espionage group also known as SILENT CHOLLIMA, Andariel, DarkSeoul, Stonefly, and TDrop2, mainly targets the military, defense sector, and technology in the United States, South Korea, and India. The group historically used spear-phishing, but they have now started using N-day vulnerabilities, such as in their October 2023 attack on TeamCity. To […]
The post North Korean Onyx Sleet Using Group Of Malware And Exploits to Gain Intelligence appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
记一次NginxWebUI 引发的渗透
智谱AI刚发布的视频生成工具
Cisco Patches the Products Impacted by RADIUS Protocol Vulnerability
Cisco has issued patches for multiple products affected by a critical vulnerability in the RADIUS protocol. The vulnerability, identified as CVE-2024-3596, was disclosed by security researchers on July 7, 2024. This flaw allows an on-path attacker to forge responses using a chosen prefix collision attack against the MD5 Response Authenticator signature. Cisco has been actively […]
The post Cisco Patches the Products Impacted by RADIUS Protocol Vulnerability appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.