Malicious Go Binary Delivered via Steganography in PyPI

The malicious package, called “requests-darwin-lite”, was a fork of the popular “requests” ...

Feds, Military Personnel Compete in President’s Cyber Cup Challenge

Artificially Intelligent — a team of four Army servicemembers and one from the Air Force — won the 2024 President’s ...

Selfie Spoofing Becomes Popular Identity Document Fraud Technique

Selfie spoofing and document image-of-image fraud have become the most prevalent identity document fraud techniques, ...

FIN7 Uses Trusted Brands and Sponsored Google Ads to Distribute MSIX Payloads

The financially motivated group FIN7 has been observed leveraging malicious Google ads that impersonate legitimate ...

Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo

Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular ...

Attack Makes Autonomous Vehicle Tech Ignore Road Signs

Researchers have developed a technique called “GhostStripe” that can exploit the camera-based computer ...

FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT

The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing ...

‘The Mask’ Espionage Group Resurfaces After 10-Year Hiatus

An advanced persistent threat (APT) group that has been missing in action for more than a decade has suddenly resurfaced ...

1 208 209 210 211 212 213 214 215 216 217 218 661