Cybersecurity Blog
Malicious Go Binary Delivered via Steganography in PyPI
The malicious package, called “requests-darwin-lite”, was a fork of the popular “requests” ...
Feds, Military Personnel Compete in President’s Cyber Cup Challenge
Artificially Intelligent — a team of four Army servicemembers and one from the Air Force — won the 2024 President’s ...
Selfie Spoofing Becomes Popular Identity Document Fraud Technique
Selfie spoofing and document image-of-image fraud have become the most prevalent identity document fraud techniques, ...
FIN7 Uses Trusted Brands and Sponsored Google Ads to Distribute MSIX Payloads
The financially motivated group FIN7 has been observed leveraging malicious Google ads that impersonate legitimate ...
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular ...
Attack Makes Autonomous Vehicle Tech Ignore Road Signs
Researchers have developed a technique called “GhostStripe” that can exploit the camera-based computer ...
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing ...
‘The Mask’ Espionage Group Resurfaces After 10-Year Hiatus
An advanced persistent threat (APT) group that has been missing in action for more than a decade has suddenly resurfaced ...