Aggregator
Tor Browser 13.5.2 Released: What’s New!
The Tor Project has announced the release of Tor Browser 13.5.2, which includes significant security updates and improvements, mainly focusing on integrating the latest Firefox security patches. Tor Browser anonymizes web traffic using the Tor network, making it easy to protect your identity online. The Tor Browser, updated to version 11.4.31, enhances script-blocking capabilities and […]
The post Tor Browser 13.5.2 Released: What’s New! appeared first on Cyber Security News.
Beware Of New Botnet Attacking ASUS Routers & Opens Port 63256
Botnets attack routers to gain control over these devices, turning them into “zombies” that can be used to carry out malicious activities. While they execute all their illicit activities without getting detected, and they do activities like DDoS attacks, spreading malware, facilitating further network intrusions, and many more. In October 2023, Gi7w0rm first referenced the […]
The post Beware Of New Botnet Attacking ASUS Routers & Opens Port 63256 appeared first on Cyber Security News.
新型APT攻击技术手法曝光,利用AutoIt技术针对特定领域展开精密攻击——每周威胁情报动态第187期(08.02-08.08)
Record Breaking DDoS Attack 419 TB of Malicious Traffic Within 24-Hours
A record-breaking Distributed Denial of Service (DDoS) attack unleashed 419 terabytes of malicious traffic over 24 hours. This unprecedented event, which began at 8:05 UTC on July 15, 2024, targeted a financial services company in Israel, showcasing the evolving threat landscape of cyber warfare. A Sustained Assault The attack commenced with a small probing attempt, […]
The post Record Breaking DDoS Attack 419 TB of Malicious Traffic Within 24-Hours appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
MacOS Stealer Mimic as Screen Recorder Attacking Users via Google Ads
A new AMOS Mac stealer variant is circulating, distributed via a fake Loom website hosted on Google Ads, which, potentially linked to the Crazy Evil threat group, redirects users to a fraudulent download page disguised as the legitimate Loom platform. Once executed, the advanced AMOS stealer exfiltrates sensitive data, including browser information, credentials, and cryptocurrency […]
The post MacOS Stealer Mimic as Screen Recorder Attacking Users via Google Ads appeared first on Cyber Security News.
Mule-as-a-Service Infrastructure Exposed
Тревожная эпоха интернет-цензуры: Турция душит свободу в Сети
Researches Introduced MaskAnyone Toolkit To Minimize The Privacy Risks
Audio-visual data offers invaluable insights into human behavior and communication but raises significant privacy concerns, which proposes MaskAnyone, a toolkit for de-identifying individuals in audio-visual data while preserving data utility. By combining face-swapping, auditory masking, and real-time bulk processing, MaskAnyone addresses the ethical and legal challenges associated with human subject data. The toolkit is designed […]
The post Researches Introduced MaskAnyone Toolkit To Minimize The Privacy Risks appeared first on Cyber Security News.
挖了这么久才发现,漏洞挖掘可以更简单
挖了这么久才发现,漏洞挖掘可以更简单
Beware Of Fake WinRar Websites Delivering Ransomware via GitHub
The threat actors often exploit fake websites to trick users into revealing their personal data. Not only that, but these fake websites are also used to distribute malware, steal identities, and facilitate phishing attacks. Cybersecurity researchers at SonicWall discovered a deceptive WinRar lookalike website that employs typosquatting to distribute malware. This initial infection triggers the […]
The post Beware Of Fake WinRar Websites Delivering Ransomware via GitHub appeared first on Cyber Security News.