IAmAntimalware post logo
13
Oct
2025

Inject Malicious Code Into Antivirus

  I. STARTER When conducting penetration testing on target machines, our actions will be ruthlessly monitored and judged by Antivirus….

13
Oct
2025

Inject Malicious Code Into Antivirus

  I. STARTER When conducting penetration testing on target machines, our actions will be ruthlessly monitored and judged by Antivirus….

Threat Actors Weaponize Discord Webhooks for Command and Control with npm, PyPI, and Ruby Packages
13
Oct
2025

Threat Actors Weaponize Discord Webhooks for Command and Control with npm, PyPI, and Ruby Packages

Cybercriminals have discovered a novel way to co-opt Discord webhooks as surrogate command-and-control (C2) channels across popular language ecosystems. Unlike…

Axis Communications Vulnerability Exposes Azure Storage Credentials
13
Oct
2025

Axis Communications Vulnerability Exposes Azure Storage Credentials

Axis Communications, a leading provider of network video and surveillance solutions, has confirmed a critical vulnerability in its Autodesk® Revit®…

Invoicely Database Leak Exposes 180,000 Sensitive Records
13
Oct
2025

Invoicely Database Leak Exposes 180,000 Sensitive Records

A large volume of private business and personal records was left exposed online after a database belonging to, or linked…

Google says Australian law on age verification 'extremely difficult' to enforce
13
Oct
2025

Google says Australian law on age verification ‘extremely difficult’ to enforce

Google said it would be “extremely difficult” for Australia to enforce a law prohibiting people younger than 16 from using…

13
Oct
2025

Inject Malicious Code Into Antivirus

  I. STARTER When conducting penetration testing on target machines, our actions will be ruthlessly monitored and judged by Antivirus….

Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor
13
Oct
2025

Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor

Oct 13, 2025Ravie LakshmananBrowser Security / Windows Security Microsoft said it has revamped the Internet Explorer (IE) mode in its…

CI Fortify
13
Oct
2025

Australia Launches CI Fortify For Cyber Protection

As the cyber threat landscape down under intensifies, Australia has launched CI Fortify, a comprehensive guidance framework designed to help…

Astaroth Trojan abuses GitHub to host configs and evade takedowns
13
Oct
2025

Astaroth Trojan abuses GitHub to host configs and evade takedowns

Astaroth Trojan abuses GitHub to host configs and evade takedowns Pierluigi Paganini October 13, 2025 The Astaroth banking Trojan uses…

EDR-Freeze Tool Technical Workings Along With Forensic Artifacts Revealed
13
Oct
2025

EDR-Freeze Tool Technical Workings Along With Forensic Artifacts Revealed

A recent analysis from researcher Itamar Hällström has revealed the technical workings and forensic trail of “EDR-Freeze,” a proof-of-concept technique…

North Korean Hackers Target Developers with 338 Malicious Software Packages
13
Oct
2025

North Korean Hackers Target Developers with 338 Malicious Software Packages

North Korean threat actors have escalated their Contagious Interview campaign, deploying 338 malicious npm packages with over 50,000 downloads to…