Malicious Payload Found in JPEG Image Using Steganography and Base64 Obfuscation
Cybersecurity enthusiast Xavier shed light on a sophisticated method of hiding malicious payloads within seemingly innocuous JPEG images. This discovery...
Read more →Cybersecurity enthusiast Xavier shed light on a sophisticated method of hiding malicious payloads within seemingly innocuous JPEG images. This discovery...
Read more →The JFrog Security Research team has uncovered a sophisticated malicious package named “chimera-sandbox-extensions” on the Python Package Index (PyPI), a...
Read more →The emergence of Katz Stealer, a sophisticated information-stealing malware-as-a-service (MaaS) that is redefining the boundaries of credential theft. First detected...
Read more →The U.S. Department of Justice (DoJ) said it has filed a civil forfeiture complaint in federal court that targets over...
Read more →Law enforcement operation shut down dark web drug marketplace Archetyp Market Pierluigi Paganini June 16, 2025 Europol shut down Archetyp...
Read more →A high-severity vulnerability in ASUS Armoury Crate software could allow threat actors to escalate their privileges to SYSTEM level on...
Read more →A critical vulnerability affecting over 46,000 publicly accessible Grafana instances worldwide, with 36% of all public-facing deployments vulnerable to complete...
Read more →The Washington Post confirmed late last week that its email systems were targeted in a cyberattack, resulting in the compromise...
Read more →A sophisticated phishing operation involving more than 20 malicious applications distributed through the Google Play Store, specifically designed to steal...
Read more →New research by Infoblox Threat Intel exposes a hidden alliance between major cybercrime groups like VexTrio and seemingly legitimate AdTech...
Read more →A sophisticated new information-stealing malware known as Katz Stealer has emerged in 2025, demonstrating advanced credential theft capabilities combined with...
Read more →This week on the Lock and Code podcast… Complex problems often assume complex solutions, but recent observations about increased levels...
Read more →