3CX Supply Chain Attack
04
Apr
2023

Cryptocurrency Companies Targeted in Sophisticated 3CX Supply Chain Attack

Apr 04, 2023Ravie LakshmananCryptocurrency / Cyber Attack The adversary behind the supply chain attack targeting 3CX deployed a second-stage implant…

04
Apr
2023

Shadow data slipping past security teams

The rapid pace of cloud transformation and democratization of data has created a new innovation attack surface, leading to 3…

an RCE vulnerability in Azure Service Fabric Explorer
04
Apr
2023

an RCE vulnerability in Azure Service Fabric Explorer

Researchers disclosed how they found a remote code execution vulnerability in Azure Service Fabric Explorer. Researchers at Orca Security disclosed how…

Octopus Strike! Three Argo CD API Exploits In Two Weeks
04
Apr
2023

Octopus Strike! Three Argo CD API Exploits In Two Weeks

Argo CD is a popular Continuous Deployment tool that enables DevOps teams to manage their applications across multiple environments. However,…

how to spot a verified account
04
Apr
2023

how to spot a verified account

Significant changes to Twitter’s verification identifiers mean new rules for ensuring whether an account is real. Twitter has made some…

Building a secure application: the first step | Security Simplified
04
Apr
2023

Building a secure application: the first step | Security Simplified

Building a secure application: the first step | Security Simplified Source link

3CX
04
Apr
2023

Cryptocurrency companies backdoored in 3CX supply chain attack

Some of the victims affected by the 3CX supply chain attack have also had their systems backdoored with Gopuram malware,…

New macOS malware steals sensitive info, including a user's entire Keychain database
04
Apr
2023

New macOS malware steals sensitive info, including a user’s entire Keychain database

MacStealer could be an infamous stealer in the making, but right now, it needs improvement, according to Malwarebytes expert. A…

TomNomNom Demos a Ben Eater 8-bit CPU Emulator
04
Apr
2023

TomNomNom Demos a Ben Eater 8-bit CPU Emulator

TomNomNom Demos a Ben Eater 8-bit CPU Emulator Source link

WinRAR SFX archives can run PoweShell without being detected
04
Apr
2023

WinRAR SFX archives can run PowerShell without being detected

Hackers are adding malicious functionality to WinRAR self-extracting archives that contain harmless decoy files, allowing them to plant backdoors without…

[tl;dr sec] #168 - GCP and Azure Storage Threat Models, macOS Security, Red Team Resources
03
Apr
2023

[tl;dr sec] #168 – GCP and Azure Storage Threat Models, macOS Security, Red Team Resources

Hey there, I hope you’ve been doing well! Semgrep in EU I was a bit sleepy when I was finishing…

Bitcoin
03
Apr
2023

US seizes $112 million from cryptocurrency investment scammers

Today, the U.S. Department of Justice seized six virtual currency accounts containing over $112 million in funds stolen in cryptocurrency…