Category: Attack Feeds

0

GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories  – The Hacker News

Cybersecurity researchers are calling attention to an incident in which the popular GitHub Action tj-actions/changed-files was compromised to leak secrets from repositories using the continuous integration and continuous delivery (CI/CD) workflow. The incident involved the tj-actions/changed-files GitHub Action, which is used in over 23,000 repositories. It’s used to track and retrieve all  – Read More  – The Hacker News 

0

Are your iPhone or MacBook hacked?  – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.

Understanding Common Misconceptions Digital security is a growing concern, and many Apple users suspect their iPhones or MacBooks have been hacked. However, in most cases, these fears stem from new features, security alerts, or misinterpretations of system behaviour rather than actual cyberattacks. This article explores common reasons why people believe their Apple devices are compromised […] The post Are your...

0

Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal  – The Hacker News

Cybersecurity researchers have warned of a malicious campaign targeting users of the Python Package Index (PyPI) repository with bogus libraries masquerading as “time” related utilities, but harboring hidden functionality to steal sensitive data such as cloud access tokens. Software supply chain security firm ReversingLabs said it discovered two sets of packages totaling 20 of them. The packages  – Read More ...

0

ClickFix: How to Infect Your PC in Three Easy Steps  – Krebs on Security

A clever malware deployment scheme first spotted in targeted attacks last year has now gone mainstream. In this scam, dubbed “ClickFix,” the visitor to a hacked or malicious website is asked to distinguish themselves from bots by pressing a combination of keyboard keys that causes Microsoft Windows to download password-stealing malware. ClickFix attacks mimic the “Verify You are a Human”...

0

California’s legal push on geolocation data collection must take aim at the right targets, privacy experts say  – CyberScoop

The attorney general for California announced this week a wide-ranging investigation into the way companies collect, process and use consumer location data. The investigation will include scrutiny of advertising networks, mobile app providers and data brokers whose practices may violate the California Consumer Privacy Act (CCPA), one of the strictest state privacy laws in the nation. Specifically, the attorney general’s...

0

Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges  – The Hacker News

A 51-year-old dual Russian and Israeli national who is alleged to be a developer of the LockBit ransomware group has been extradited to the United States, nearly three months after he was formally charged in connection with the e-crime scheme. Rostislav Panev was previously arrested in Israel in August 2024. He is said to have been working as a developer for...

0

Water utilities would get cybersecurity boost under bipartisan Senate bill  – CyberScoop

Small water and wastewater utilities would get a boost to their cybersecurity defenses under a bipartisan Senate bill that a pair of lawmakers re-introduced Thursday. Sens. Catherine Cortez Masto, D-Nev., and Mike Rounds, R-S.D., are taking another swing at the Cybersecurity for Rural Water Systems Act after the legislation stalled out in the 118th Congress. The bill would update and...

0

GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging  – The Hacker News

The GSM Association (GSMA) has formally announced support for end-to-end encryption (E2EE) for securing messages sent via the Rich Communications Services (RCS) protocol, bringing much-needed security protections to cross-platform messages shared between Android and iOS platforms. To that end, the new GSMA specifications for RCS include E2EE based on the Messaging Layer Security (MLS) protocol  – Read More  – The...

0

Why Most Microsegmentation Projects Fail—And How Andelyn Biosciences Got It Right  – The Hacker News

Most microsegmentation projects fail before they even get off the ground—too complex, too slow, too disruptive. But Andelyn Biosciences proved it doesn’t have to be that way.  Microsegmentation: The Missing Piece in Zero Trust Security  Security teams today are under constant pressure to defend against increasingly sophisticated cyber threats. Perimeter-based defenses alone can no  – Read More  – The Hacker...

0

Live Ransomware Demo: See How Hackers Breach Networks and Demand a Ransom  – The Hacker News

Cyber threats evolve daily. In this live webinar, learn exactly how ransomware attacks unfold—from the initial breach to the moment hackers demand payment. Join Joseph Carson, Delinea’s Chief Security Scientist and Advisory CISO, who brings 25 years of enterprise security expertise. Through a live demonstration, he will break down every technical step of a ransomware attack, showing you how  –...

0

New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions  – The Hacker News

Users searching for pirated software are the target of a new malware campaign that delivers a previously undocumented clipper malware called MassJacker, according to findings from CyberArk. Clipper malware is a type of cryware (as coined by Microsoft) that’s designed to monitor a victim’s clipboard content and facilitate cryptocurrency theft by substituting copied cryptocurrency wallet addresses  – Read More  –...

0

OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection  – The Hacker News

A new malware campaign has been observed leveraging social engineering tactics to deliver an open-source rootkit called r77. The activity, condemned OBSCURE#BAT by Securonix, enables threat actors to establish persistence and evade detection on compromised systems. It’s currently not known who is behind the campaign. The rootkit “has the ability to cloak or mask any file, registry key or task ...

0

Microsoft Warns of ClickFix Phishing Campaign Targeting Hospitality Sector via Fake Booking[.]com Emails  – The Hacker News

Microsoft has shed light on an ongoing phishing campaign that targeted the hospitality sector by impersonating online travel agency Booking.com using an increasingly popular social engineering technique called ClickFix to deliver credential-stealing malware. The activity, the tech giant said, started in December 2024 and operates with the end goal of conducting financial fraud and theft. It’s  – Read More  –...

0

North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps  – The Hacker News

The North Korea-linked threat actor known as ScarCruft is said to have been behind a never-before-seen Android surveillance tool named KoSpy targeting Korean and English-speaking users. Lookout, which shared details of the malware campaign, said the earliest versions date back to March 2022. The most recent samples were flagged in March 2024. It’s not clear how successful these efforts were....

0

GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks  – The Hacker News

Two high-severity security flaws have been disclosed in the open-source ruby-saml library that could allow malicious actors to bypass Security Assertion Markup Language (SAML) authentication protections. SAML is an XML-based markup language and open-standard used for exchanging authentication and authorization data between parties, enabling features like single sign-on (SSO), which allows  – Read More  – The Hacker News 

0

Future-Proofing Business Continuity: BCDR Trends and Challenges for 2025  – The Hacker News

As IT environments grow more complex, IT professionals are facing unprecedented pressure to secure business-critical data. With hybrid work the new standard and cloud adoption on the rise, data is increasingly distributed across different environments, providers and locations, expanding the attack surface for emerging cyberthreats. While the need for a strong data protection strategy has become  – Read More  –...

0

WARNING: Expiring Root Certificate May Disable Firefox Add-Ons, Security Features, and DRM Playback  – The Hacker News

Browser maker Mozilla is urging users to update their Firefox instances to the latest version to avoid facing issues with using add-ons due to the impending expiration of a root certificate. “On March 14, 2025, a root certificate used to verify signed content and add-ons for various Mozilla projects, including Firefox, will expire,” Mozilla said. “Without updating to Firefox  –...

0

Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk  – The Hacker News

Meta has warned that a security vulnerability impacting the FreeType open-source font rendering library may have been exploited in the wild. The vulnerability has been assigned the CVE identifier CVE-2025-27363, and carries a CVSS score of 8.1, indicating high severity. Described as an out-of-bounds write flaw, it could be exploited to achieve remote code execution when parsing certain font  –...

0

Smashing Security podcast #408: A gag order backfires, and a snail mail ransom demand  – Graham Cluley

What happens when a healthcare giant’s legal threats ignite a Streisand Effect wildfire… while a ransomware gang appears to ditch the dark web for postage stamps? Find out about this, and more, in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.  – Read More  – Graham Cluley 

0

Lazarus Group deceives developers with 6 new malicious npm packages  – CyberScoop

Lazarus Group has burrowed deeper into the npm registry and planted six new malicious packages designed to deceive software developers and disrupt their workflows, researchers at cybersecurity firm Socket said in a Monday blog post. The North Korea-linked threat group embedded BeaverTail malware into the npm packages to install backdoors and steal credentials and data in cryptocurrency wallets, according to...

0

Legislative push for child online safety runs afoul of encryption advocates (again)  – CyberScoop

Two members of the Senate Judiciary Committee are preparing to introduce  a bipartisan bill that would mandate tech companies to more swiftly report and remove child sexual abuse material hosted on their platforms, but critics warn it could result in the weakening or elimination of encrypted messaging services that many Americans rely on. The Stop CSAM Act, first introduced in...

0

Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits  – The Hacker News

The China-nexus cyber espionage group tracked as UNC3886 has been observed targeting end-of-life MX routers from Juniper Networks as part of a campaign designed to deploy custom backdoors, highlighting their ability to focus on internal networking infrastructure. “The backdoors had varying custom capabilities, including active and passive backdoor functions, as well as an embedded script that  – Read More  –...

0

Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack  – The Hacker News

Threat intelligence firm GreyNoise is warning of a “coordinated surge” in the exploitation of Server-Side Request Forgery (SSRF) vulnerabilities spanning multiple platforms. “At least 400 IPs have been seen actively exploiting multiple SSRF CVEs simultaneously, with notable overlap between attack attempts,” the company said, adding it observed the activity on March 9, 2025. The countries which  – Read More  –...

0

March 2025 Patch Tuesday: Microsoft Fixes 57 Vulnerabilities, 7 Zero-Days  – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News

Microsoft’s March 2025 Patch Tuesday fixes six actively exploited zero-day vulnerabilities, including critical RCE and privilege escalation flaws. Learn how these vulnerabilities impact Windows systems and why immediate patching is essential.  – Read More  – Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News 

0

Pentesters: Is AI Coming for Your Role?  – The Hacker News

We’ve been hearing the same story for years: AI is coming for your job. In fact, in 2017, McKinsey printed a report, Jobs Lost, Jobs Gained: Workforce Transitions in a Time of Automation, predicting that by 2030, 375 million workers would need to find new jobs or risk being displaced by AI and automation. Queue the anxiety.  There have been...

AttackFeed by Joe Wagner
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.