Notorious State-Sponsored Hacker Group Stealthy Infrastructure Uncovered
Group-IB's cybersecurity researchers made a significant discovery, revealing undisclosed attack infrastructure employed by the highly active state-sponsored group SideWinder. Their targets mainly encompassed entities situated in:-
Pakistan
China
In a collaborative report, cybersecurity firms Group-IB and Bridewell...
Authorities Warns Of North Korean Attackers Stealing Military Technologies
Threat actors target military technologies to gain a strategic advantage, access classified information, and compromise national security.
Recently, Germany's BfV and South Korea's NIS and CSA issued a second advisory on North Korean cyber actors...
Hackers Leveraging CHM Files To Attack Users With Password-Protected Zip Files
Hackers abuse CHM files because they can embed malicious scripts or code within them. Windows systems often trust and execute these files without many security checks.
When the CHM file is opened, it enables...
Critical Splunk Vulnerability Exploited Using Crafted GET Commands
Splunk Enterprise is one of the many applications Splunk offers for security and monitoring purposes.
It allows organizations to search, analyze and visualize data which can help to respond to incidents in a better way....
VS Code Marketplace Flaw Let Attackers Include Malicious Extensions
Researchers identified security vulnerabilities in the VS Code Marketplace that could be exploited by malicious actors, as these flaws allowed extensions with malicious dependencies to gain credibility (through high install numbers) and access to...
GitHub Vulnerability “ArtiPACKED” Trigger RCE Exploit to Hack Repositories
The research identifies a critical security vulnerability in GitHub Actions artifacts, enabling unauthorized access to tokens and secrets within CI/CD pipelines.
Misconfigured workflows in major organizations' public repositories exposed sensitive information, potentially compromising cloud environments...
SmokeLoader – A Modular Malware With Range Of Capabilities
Hackers misuse malware for diverse illicit intentions, including data theft, disrupting systems, espionage, or distortion for unethical monetary benefits.
Besides this malware is also helpful in conducting cyber warfare or receptive intelligence by the nation-state...
NSA, CISA Released Guidance And Best Practices To Secure The AI
In an era where artificial intelligence (AI) systems are becoming increasingly integral to our daily lives, the National Security Agency’s Artificial Intelligence Security Center (NSA AISC) has taken a significant step forward in enhancing...
SYS01 InfoStealer Malware Attacking Meta Business Page To Steal Logins
Infostealer malware is a type of malicious software designed to infiltrate computer systems and extract sensitive information. Once the data is collected, it is sent to remote servers controlled by threat actors and often...
Hackers Attempted To Takeover JavaScript Project From OpenJS Foundation
Attackers tried to take over the JavaScript project from OpenJS Foundation, which is home to JavaScript projects utilized by billions of websites globally.
This is similar to the incident that was recently disclosed and targeted at...