Attacks on Bytecode Interpreters Conceal Malicious Injection Activity

This type of attack, known as Bytecode Jiu-Jitsu, takes advantage of the fact that interpreters do not require execution ...

Hackers Exploit Misconfigured Jupyter Notebooks with Repurposed Minecraft DDoS Tool

Cybersecurity researchers have disclosed details of a new distributed denial-of-service (DDoS) attack campaign targeting ...

APT41 Hackers Use ShadowPad, Cobalt Strike in Taiwanese Institute Cyber Attack

A Taiwanese government-affiliated research institute that specializes in computing and associated technologies was ...

APT28 Targets Diplomats with HeadLace Malware via Car Sale Phishing Lure

A Russia-linked threat actor has been linked to a new campaign that employed a car for sale as a phishing lure to ...

StackExchange Abused to Spread Malicious PyPI Packages as Answers

Threat actors used StackExchange to promote malicious PyPi packages, including ‘spl-types,’ ...

Webinar: Discover the All-in-One Cybersecurity Solution for SMBs

In today’s digital battlefield, small and medium businesses (SMBs) face the same cyber threats as large ...

CrowdStrike Investors File Class Action Suit Following Global IT Outage

The Plymouth County Retirement Association claims the company misrepresented the effectiveness of its software platform ...

Social Media Malvertising Campaign Promotes Fake AI Editor Website for Credential Theft

A recent malvertising campaign has been exposed, where threat actors take over social media pages, rebranding them as ...

1 93 94 95 96 97 98 99 100 101 102 103 667