Mallox Ransomware Targets Linux Systems with Modified Kryptina Code | Black Hat Ethical Hacking

The Mallox affiliate discovered by SentinelLabs exploited this leak, using Kryptina’s source code to develop a…

North Korean Hackers Deploy PondRAT via Poisoned Python Packages in Supply Chain Attacks | Black Hat Ethical Hacking

Once downloaded, these packages execute a second-stage payload that fetches the malware from a remote server,…

Is Tor Still Safe? Law Enforcement Exploits Highlight Timing Attack Vulnerabilities

Is Tor Still Safe? Law Enforcement Exploits Highlight Timing Attack Vulnerabilities Post Views: 230 Join our…

TeamViewer Confirms Security Breach by Russian Midnight Blizzard Group

TeamViewer reassures users after a security breach targeted an employee account. The company claims no customer…

Juniper releases out-of-cycle fix for max severity auth bypass flaw

Juniper Networks has released an emergency update to address a maximum severity vulnerability that leads to…

LAUSD Data Breach: Hackers Leak 25M Records, Including Student Locations

The Los Angeles Unified School District (LAUSD) has fallen victim to a significant data breach. A…

DISGOMOJI: New Linux Malware Uses Emojis for Command Execution | Black Hat Ethical Hacking

Unique C2 Mechanism: Discord and Emojis The malware was discovered when Volexity researchers found a UPX-packed…

AMD Investigates Potential Cyberattack Following Data Breach Claims on Hacking Forum | Black Hat Ethical Hacking

Potential Impact and Previous Incidents According to reports from DarkWebInformer, the data allegedly includes an employee…

Cybernews Today: PowerShell “Fix” Results in Malware Infections

In the world of cybersecurity, analysts at Proofpoint have uncovered three distinct attack chains that all…