Cybersecurity Blog
JPCERT/CC Warns of Malicious PyPI Packages Created by North Korean Hackers
The malicious packages were disguised as legitimate Python packages, and although they have been removed from PyPI, they ...
Kali Linux 2024.1 released: New tools, new look, new Kali Nethunter kernels – Help Net Security
OffSec has released Kali Linux 2024.1, the latest version of its popular penetration testing and digital forensics ...
Savvy Seahorse Gang Uses DNS CNAME Records to Power Investor Scams
Personal data of victims is collected through registration forms on fake investment platforms, and the actor tracks user ...
Lazarus Hackers Exploited Windows Zero-Day to Gain Kernel Privileges
The exploit allowed Lazarus to enhance its FudModule rootkit, enabling it to evade detection and disable security ...
Five Eyes Agencies Warn of Active Exploitation of Ivanti Gateway Vulnerabilities
Mar 01, 2024NewsroomRootkit / Threat Intelligence The Five Eyes (FVEY) intelligence alliance has issued a new ...
GitHub Rolls Out Default Secret Scanning Push Protection for Public Repositories
Mar 01, 2024NewsroomDevSecOps / Cybersecurity GitHub on Thursday announced that it’s enabling secret scanning ...
Update: BlackCat Ransomware Gang Claims They Stole 6TB of Change Healthcare Data
The BlackCat/ALPHV ransomware gang claimed responsibility for a cyberattack on Optum, affecting the Change Healthcare ...
European diplomats targeted by SPIKEDWINE with WINELOADER
Technical Analysis In this section, we provide a detailed analysis of each component of the attack chain initiated when ...