Sat.Mar 16, 2024

article thumbnail

Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer

The Hacker News

Cybersecurity researchers have found a number of GitHub repositories offering cracked software that are used to deliver an information stealer called RisePro. The campaign, codenamed gitgub, includes 17 repositories associated with 11 different accounts, according to G DATA. The repositories in question have since been taken down by the Microsoft-owned subsidiary.

Software 134
article thumbnail

Hackers exploit Aiohttp bug to find vulnerable networks

Bleeping Computer

The ransomware actor 'ShadowSyndicate' was observed scanning for servers vulnerable to CVE-2024-23334, a directory traversal vulnerability in the aiohttp Python library. [.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lazarus APT group returned to Tornado Cash to launder stolen funds

Security Affairs

North Korea-linked Lazarus APT group allegedly using again the mixer platform Tornado Cash to launder $23 million. North Korea-linked Lazarus APT group allegedly has reportedly resumed using the mixer platform Tornado Cash to launder $23 million. Blockchain cybersecurity firm Elliptic linked the theft of $112.5 million from exchange HTX , which took place in November 2023, to the North Korea’s group.

article thumbnail

Bluetooth Eavesdropping Threat Exposed: New “BlueSpy” Exploit Targets Popular Headsets

Penetration Testing

A cybersecurity research team has shaken the Bluetooth world at the RootedCon Madrid 2024 conference. Tarlogic Security unveiled “BlueSpy,” a proof-of-concept exploit that demonstrates how popular Bluetooth headsets can be silently turned into eavesdropping... The post Bluetooth Eavesdropping Threat Exposed: New “BlueSpy” Exploit Targets Popular Headsets appeared first on Penetration Testing.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

France Travail data breach impacted 43 Million people

Security Affairs

Unemployment agency France Travail (Pôle Emploi) recently suffered a data breach that could impact 43 million people. On August 2023, the French government employment agency Pôle emploi suffered a data breach and notified 10 million individuals impacted by the security breach. The press release published by the agency states that its information systems are not impacted.

article thumbnail

linWinPwn: Swiss-Army knife for Active Directory Pentesting using Linux

Penetration Testing

linWinPwn linWinPwn is a bash script that wraps many Active Directory tools for enumeration (LDAP, RPC, ADCS, MSSQL, Kerberos), vulnerability checks (noPac, ZeroLogon, MS17-010, MS14-068), object modifications (password change, add user to a group,... The post linWinPwn: Swiss-Army knife for Active Directory Pentesting using Linux appeared first on Penetration Testing.

More Trending

article thumbnail

VectorKernel: PoCs for Kernelmode rootkit techniques research

Penetration Testing

VectorKernel PoCs for Kernelmode rootkit techniques research or education. Currently focusing on Windows OS. All modules support 64-bit OS only. NOTE Some modules use ExAllocatePool2 API to allocate kernel pool memory. ExAllocatePool2 API is not... The post VectorKernel: PoCs for Kernelmode rootkit techniques research appeared first on Penetration Testing.

article thumbnail

Automakers Are Telling Your Insurance Company How You Really Drive

WIRED Threat Level

Plus: The operator of a dark-web cryptocurrency “mixing” service is found guilty, and a US senator reveals that popular safes contain secret backdoors.

Insurance 101
article thumbnail

USENIX Security ’23 – Pushed By Accident: A Mixed-Methods Study On Strategies Of Handling Secret Information In Source Code Repositories

Security Boulevard

Authors/Presenters: Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott ; and via the organizations YouTube channel.

64
article thumbnail

How to Identify & Monitor Insider Threat Indicators [A Guide]

Security Boulevard

How Your Life Events Invite Cyber & Physical Threats The post How to Identify & Monitor Insider Threat Indicators [A Guide] appeared first on Security Boulevard.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!