Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks

20/05/2024 0 Comments 0 tags

All developers want to create secure and dependable software. They should feel proud to release their code with the full confidence they did not introduce any weaknesses or anti-patterns into

Cyber Criminals Exploit GitHub and FileZilla to Deliver Cocktail Malware

20/05/2024 0 Comments 0 tags

A “multi-faceted campaign” has been observed abusing legitimate services like GitHub and FileZilla to deliver an array of stealer malware and banking trojans such as Atomic (aka AMOS), Vidar, Lumma

Latrodectus Malware Loader Emerges as IcedID’s Successor in Phishing Campaigns

20/05/2024 0 Comments 0 tags

Cybersecurity researchers have observed a spike in email phishing campaigns starting early March 2024 that delivers Latrodectus, a nascent malware loader believed to be the successor to the IcedID malware. “These

Chinese Nationals Arrested for Laundering $73 Million in Pig Butchering Crypto Scam

19/05/2024 0 Comments 0 tags

The U.S. Department of Justice (DoJ) has charged two arrested Chinese nationals for allegedly orchestrating a pig butchering scam that laundered at least $73 million from victims through shell companies.

Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide

19/05/2024 0 Comments 0 tags

The threat actors behind the Windows-based Grandoreiro banking trojan have returned in a global campaign since March 2024 following a law enforcement takedown in January. The large-scale phishing attacks, likely facilitated by

Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking

17/05/2024 0 Comments 0 tags

The cryptojacking group known as Kinsing has demonstrated its ability to continuously evolve and adapt, proving to be a persistent threat by swiftly integrating newly disclosed vulnerabilities to exploit arsenal and expand

New XM Cyber Research: 80% of Exposures from Misconfigurations, Less Than 1% from CVEs

17/05/2024 0 Comments 0 tags

A new report from XM Cyber has found – among other insights – a dramatic gap between where most organizations focus their security efforts, and where the most serious threats actually reside. The new

China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT

17/05/2024 0 Comments 0 tags

Cybersecurity researchers have shed more light on a remote access trojan (RAT) known as Deuterbear used by the China-linked BlackTech hacking group as part of a cyber espionage campaign targeting the Asia-Pacific

Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks

17/05/2024 0 Comments 0 tags

The Kimsuky (aka Springtail) advanced persistent threat (APT) group, which is linked to North Korea’s Reconnaissance General Bureau (RGB), has been observed deploying a Linux version of its GoBear backdoor as part

CISA Warns of Actively Exploited D-Link Router Vulnerabilities – Patch Now

17/05/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting D-Link routers to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The list