Trivy security tool compromised in major supply-chain attack
Researchers determined that the attackers gained access through previously stolen credentials from an earlier March breach.
Researchers determined that the attackers gained access through previously stolen credentials from an earlier March breach.
The sites were part of a large-scale scam that advertised fake CSAM “packages,” as well as other cybercrime services.
The attacks do not break end-to-end encryption but instead rely on account hijacking techniques.
In brief: Threat actors are exploiting Zimbra, MS SharePoint and WingFTP flaws, police disrupt the Aisuru, KimWolf, JackSkid and Mossad botnets, and more.
DarkSword leverages six known vulnerabilities to gain deep access to compromised devices.
Interlock had been abusing the flaw as a zero-day issue in real-world attacks as early as January 26.
Attackers gained initial access by compromising GitHub accounts and force-pushing malicious commits into existing projects.
The group is now using AI-assisted malware that includes anti-analysis features, helping it stay hidden in compromised systems for longer periods.
Russia systematically employs diplomatic missions for intelligence collection, cyber operations, and influence campaigns.
Attackers are now incorporating Bench.sh as a lightweight reconnaissance utility after gaining initial access.
Showing elements 51 - 60