The Mallox affiliate discovered by SentinelLabs exploited this leak, using Kryptina’s source code to develop a…
Category: Cyber Attack
North Korean Hackers Deploy PondRAT via Poisoned Python Packages in Supply Chain Attacks | Black Hat Ethical Hacking
Once downloaded, these packages execute a second-stage payload that fetches the malware from a remote server,…
Is Tor Still Safe? Law Enforcement Exploits Highlight Timing Attack Vulnerabilities
Is Tor Still Safe? Law Enforcement Exploits Highlight Timing Attack Vulnerabilities Post Views: 230 Join our…
TeamViewer Confirms Security Breach by Russian Midnight Blizzard Group
TeamViewer reassures users after a security breach targeted an employee account. The company claims no customer…
Juniper releases out-of-cycle fix for max severity auth bypass flaw
Juniper Networks has released an emergency update to address a maximum severity vulnerability that leads to…
LAUSD Data Breach: Hackers Leak 25M Records, Including Student Locations
The Los Angeles Unified School District (LAUSD) has fallen victim to a significant data breach. A…
DISGOMOJI: New Linux Malware Uses Emojis for Command Execution | Black Hat Ethical Hacking
Unique C2 Mechanism: Discord and Emojis The malware was discovered when Volexity researchers found a UPX-packed…
AMD Investigates Potential Cyberattack Following Data Breach Claims on Hacking Forum | Black Hat Ethical Hacking
Potential Impact and Previous Incidents According to reports from DarkWebInformer, the data allegedly includes an employee…
Cybernews Today: PowerShell “Fix” Results in Malware Infections
In the world of cybersecurity, analysts at Proofpoint have uncovered three distinct attack chains that all…