admin

Stargazer Goblin Unleashes Malware with 3,000 Fake GitHub Accounts

Uncovering the Stargazer Goblin: A Tale of Cyber Intrigue In the world of cybersecurity, there’s always a new threat lurking around the corner. Meet the notorious Stargazer Goblin, a threat actor who has cunningly devised a network of inauthentic GitHub accounts to fuel a sophisticated Distribution-as-a-Service (DaaS) scheme. This devious operation entails spreading a variety…

Read More

How to Protect Against Gh0st RAT Trojan Targeting Chinese Windows Users

Gh0st RAT and Gh0stGambit: A Lethal Combination The notorious remote access trojan Gh0st RAT has resurfaced, this time in collaboration with an “evasive dropper” known as Gh0stGambit. This lethal combination is being used in a sophisticated drive-by download scheme that specifically targets Chinese-speaking Windows users. The threat actors behind this operation are cunning and have…

Read More

Ranljivost omogočila brisanje GitHub repozitorijev, tudi zasebnih & dostopnih

Izbrisani GitHub-jevi repozitoriji še vedno dostopni: Varnostna ranljivost omogoča dostop do zasebnih podatkov GitHub, ena izmed najbolj priljubljenih platform za upravljanje izvorne kode, je bila tarča resne varnostne ranljivosti. Nedavno so bile izbrisane GitHub-jeve repozitorije, vključno z zasebnimi, še vedno dostopne javnosti. Ta ranljivost predstavlja potencialno tveganje za uporabnike, katerih zasebni podatki so bili nepričakovano…

Read More

Kibernapičneži zlorabljajo Telegramove vmesnike API za krajo vaših prijavnih podatkov

Telegram Tarča Kibernetskih Napadov prek API-jev V zadnjih dneh so se pojavile informacije, da so kiberniški kriminalci začeli izkoriščati API-je (aplikacijski programski vmesniki) Telegrama, priljubljene aplikacije za sporočanje. Ta dejanja so povzročila skrbi med uporabniki, saj napadalci uporabljajo Telegramove API-je za izvajanje napadov in zlorabljanje podatkov uporabnikov. Glavne Ranjivosti Varnostni strokovnjaki so identificirali tri glavne…

Read More

Operation PlugX Purge: French Authorities Take Down Malware Menace

“French Authorities Partner with Europol to Combat PlugX Malware” French judicial authorities have joined forces with Europol to conduct a large-scale operation aimed at eliminating the PlugX malware from compromised hosts. Known for its malicious activities, PlugX has caused havoc across various countries, prompting this collaborative effort between the Paris Prosecutor’s Office and Europol. The…

Read More

Breach Alert: macOS Targeted with Malicious PyPI Package for Google Cloud Credentials Theft

Cybersecurity Threat on PyPI Repository: lr-utils-lib Malware Overview Recently, cybersecurity researchers unearthed a troubling cybersecurity threat on the Python Package Index (PyPI) repository. Dubbed “lr-utils-lib,” this malicious package was specifically designed to target Apple macOS systems. Its main objective? To pilfer users’ Google Cloud credentials from a select group of potential victims. Insights This deceptive…

Read More

Hekerji prekosili zaščitne programe z neverjetno sofisticiranim zlonamernim programom

Ozadje napada z neuvrščenim malwarejem V zadnjem času so uporabniki računalnikov po vsem svetu poročali o povečanju števila napadov z neuvrščenim malwarejem. Ta sofisticirana grožnja, ki jo lahko prepoznajo samo najbolj izkušeni strokovnjaki za računalniško varnost, povzroča zmedo in strah med številnimi lastniki računalniških sistemov. Neuvrščen malware je zasnovan za izkoriščanje ranljivosti, ki so do…

Read More

AI-Powered Cybercrime Service: Phishing Kits Bundle with Malicious Android Apps

Spanish-Speaking Cybercrime Group GXC Team Elevates Malware-As-A-Service Game A cybercrime crew known as the GXC Team is making some waves in the digital underworld by combining phishing kits with dodgy Android apps. This shady tactic is pushing the boundaries of the malware-as-a-service (MaaS) realm, showing an evolution in their devious methods. Group-IB’s Insight into the…

Read More

Offensive AI Revolutionizing Cybersecurity

Unraveling the Impact of IT Security in the Digital Age Unveiling the Origins of Cybersecurity Threats In the realm of IT security, a renowned incident traces back to 1971 when an ominous message surfaced on multiple computers connected to the ARPANET, the forerunner of today’s Internet. The message, “I’m the Creeper: catch me if you…

Read More