Malicious Go Modules designed to wipe Linux systems
Malicious Go Modules designed to wipe Linux systems Pierluigi Paganini May 04, 2025 Researchers found 3 malicious Go modules with hidden code that can download…
Malicious Go Modules designed to wipe Linux systems Pierluigi Paganini May 04, 2025 Researchers found 3 malicious Go modules with hidden code that can download…
Claude AI, developed by Anthropic, has been exploited by malicious actors in a range of adversarial operations, most notably a financially motivated “influence-as-a-service” campaign. This…
Security Affairs newsletter Round 522 by Pierluigi Paganini – INTERNATIONAL EDITION Pierluigi Paganini May 04, 2025 A new round of the weekly SecurityAffairs newsletter arrived!…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: RSAC 2025 ConferenceRSAC 2025 Conference took place at the Moscone…
As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting U.S. citizens, according to a detailed report from Seqrite Labs. Security…
Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the notorious financially motivated threat actor Golden Chickens, also known as Venom…
Global cybersecurity landscape is undergoing a significant transformation, as state-sponsored hacktivism gains traction amid ongoing conflicts. In 2024, Forescout Technologies Inc. documented 780 hacktivist attacks,…
North Korean nationals have successfully infiltrated the employee ranks of major global corporations at a scale previously underestimated, creating a pervasive threat to IT infrastructure…
Cybersecurity researchers uncovered a sophisticated supply chain attack targeting the Go programming language ecosystem in April 2025. Hackers have weaponized three malicious Go modules-github[.]com/truthfulpharm/prototransform, github[.]com/blankloggia/go-mcp,…
MintsLoader, a malicious loader first observed in 2024, has emerged as a formidable tool in the arsenal of multiple threat actors, including the notorious TAG-124…
Cybercriminals are intensifying their efforts to undermine multi-factor authentication (MFA) through adversary-in-the-middle (AiTM) attacks, leveraging reverse proxies to intercept sensitive data. As phishing tactics grow…
SocGholish, a notorious loader malware, has evolved into a critical tool for cybercriminals, often delivering payloads like Cobalt Strike and, more recently, RansomHub ransomware. Darktrace’s…