CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign
Defense evasion by exploiting CVE-2023-36025 Once the malicious .url file exploiting CVE-2023-36025 is executed, it connects to an attacker-controlled server...
Defense evasion by exploiting CVE-2023-36025 Once the malicious .url file exploiting CVE-2023-36025 is executed, it connects to an attacker-controlled server...
Experts found 3 malicious packages hiding crypto miners in PyPi repository Pierluigi Paganini January 04, 2024 Researchers discovered three malicious...
Jan 04, 2024NewsroomCryptocurrency Miner / Malware Three new malicious packages have been discovered in the Python Package Index (PyPI) open-source...
ESET Research has unearthed a series of malicious Python projects circulated via PyPI, the authorised Python (programming language) package repository....
Dec 16, 2023NewsroomOnline Security / Cybercrime Microsoft is warning of an uptick in malicious activity from an emerging threat cluster...
Dec 14, 2023NewsroomMalware / Supply Chain Attack Cybersecurity researchers have identified a set of 116 malicious packages on the Python...
A malicious hacking group, thought to have been operating since at least 2013, may have suffered a significant blow after...
New Windows/Linux Firmware Attack Interesting attack based on malicious pre-OS logo images: LogoFAIL is a constellation of two dozen newly...
Dec 11, 2023NewsroomData Security / Mobile Security Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google...
Around 60% of human-operated ransomware attacks now involve malicious remote encryption. Read on to learn about this prevalent ransomware attack...
Dec 05, 2023NewsroomMobile Security / Spyware A new "post-exploitation tampering technique" can be abused by malicious actors to visually deceive...
Nov 24, 2023NewsroomThreat Analysis / Dark Web More details have emerged about a malicious Telegram bot called Telekopye that's used...
Our investigations on potential security threats uncovered a malicious Google Chrome extension that we named “ParaSiteSnatcher.” The ParaSiteSnatcher framework allows...
New research by Checkmarx has unveiled a threat actor who has been injecting malicious Python packages into the open-source repository...
Cybersecurity firm Kaspersky has uncovered a malicious WhatsApp modification, or mod, now spreading through Telegram. These popular messaging apps often...