Aggregator
CVE-2025-1540 | GitLab Community Edition/Enterprise Edition up to 17.6.4/17.7.3/17.8.1 Internal Project authorization (Nessus ID 232197)
'ReVault' Security Flaws Impact Millions of Dell Laptops
Lazarus Hackers Use Fake Camera/Microphone Alerts to Deploy PyLangGhost RAT
North Korean state-sponsored threat actors associated with the Lazarus Group, specifically the subgroup known as Famous Chollima, have evolved their tactics by deploying a new Python-based remote access trojan (RAT) dubbed PyLangGhost. This malware represents a reimplementation of the earlier GoLangGhost RAT, exhibiting code structures indicative of AI-assisted porting, including Go-like logic patterns and extensive […]
The post Lazarus Hackers Use Fake Camera/Microphone Alerts to Deploy PyLangGhost RAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Nederland draagt bij aan training van 56.000 Oekraïners in Verenigd Koninkrijk
Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft
Contrast Security Adds GitHub Copilot and Sumo Logic Integrations to ADR Platform
This week at the Black Hat USA 2025 conference, Contrast Security added integrations with GitHub Copilot and the security information and event management (SIEM) platform from Sumo Logic to the Northstar edition of its application detection and response (ADR) platform. The ADR platform from Contrast Security maps live attack paths and correlates runtime behavior to surface..
The post Contrast Security Adds GitHub Copilot and Sumo Logic Integrations to ADR Platform appeared first on Security Boulevard.
Akira and Lynx Ransomware Target MSPs Using Stolen Credentials and Exploited Vulnerabilities
The Acronis Threat Research Unit (TRU) dissected recent samples from the Akira and Lynx ransomware families, revealing incremental enhancements in their ransomware-as-a-service (RaaS) models and double-extortion strategies. Both groups leverage stolen credentials, VPN vulnerabilities, reconnaissance, privilege escalation, defense evasion, and data exfiltration to infiltrate systems, primarily targeting small and medium-sized businesses (SMBs) with recycled yet […]
The post Akira and Lynx Ransomware Target MSPs Using Stolen Credentials and Exploited Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Play
You must login to view this content
Play
You must login to view this content
Play
You must login to view this content
Play
You must login to view this content
Akira ransomware abuses CPU tuning tool to disable Microsoft Defender
Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams
#BHUSA: Researchers Expose Infrastructure Behind Cybercrime Network VexTrio
VexTrio Cybercrime Outfit Run by Legit Ad Tech Firms
Думали — хлам, оказалось — революция. Забытая частица делает плетение анионов Изинга универсальным для квантовых компьютеров
Threat Actors Exploit Smart Contracts to Drain Over $900K from Crypto Wallets
SentinelLABS has exposed a sophisticated series of cryptocurrency scams where threat actors distribute malicious smart contracts masquerading as automated trading bots, resulting in the drainage of user wallets exceeding $900,000 USD. These scams leverage obfuscated Solidity code deployed on platforms like the Remix Solidity Compiler, targeting Ethereum-based ecosystems. The campaigns, active since early 2024, employ […]
The post Threat Actors Exploit Smart Contracts to Drain Over $900K from Crypto Wallets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Medusa Blog
You must login to view this content
QilinSecuro
You must login to view this content