North Korean danger on-screen characters are effectively misusing a basic security imperfection in JetBrains TeamCity to astutely breach helpless servers, agreeing to Microsoft. The assaults, which involve the misuse of CVE-2023-42793 (CVSS... Read more »
A threat actor, presumably from Tunisia, has been linked to a new campaign targeting exposed Jupyter Notebooks in a two-fold attempt to illicitly mine cryptocurrency and breach cloud environments. Dubbed Qubitstrike by Cado, the... Read more »
The emergence of harmful Generative AI, like FraudGPT and WormGPT, has recently presented the cybersecurity landscape with a frightening new reality. These malicious creations, which are hidden away on the internet, represent... Read more »
Threat actors have been seen using Binance’s Smart Chain (BSC) contracts to deliver malicious code in what has been called the “next level of bulletproof hosting.” Guardio Labs has given the campaign,... Read more »
ToddyCat, an advanced persistent threat (APT) actor, has been connected to a fresh batch of malicious tools intended for data exfiltration, providing more information about the strategies and toolset of the hacking... Read more »
It has been discovered that a malicious package housed on the NuGet package manager for the.NET Framework distributes a remote access trojan known as SeroXen RAT. The package was created by a... Read more »
When attacking poorly maintained Linux SSH servers, the threat actors behind ShellBot use IP addresses that have been converted into its hexadecimal notation. “The overall pattern remains same, except the file downloading... Read more »
Five months after rolling out support against the FIDO Alliance-backed passwordless system for Google Accounts across all platforms, Google said on Tuesday that all users would be able to set up passkeys... Read more »
An important security hole in the libwebp image library, which is used to render images in the WebP format, has been given a new CVE number by Google and is currently being... Read more »
Microsoft has described a recent campaign in which hackers made an unsuccessful attempt to use a SQL Server server as a lateral move to a cloud environment. According to a report released... Read more »