Analysts from AquaSec discovered new malware for Linux. The malware, named Koske, is believed to have been developed using AI. To execute directly into memory, the malware uses JPEG images of pandas.
CONTINUE READING 🡒 Hacker Injects Malware into Early Access Game on Steam
A hacker known by the alias EncryptHub (also known as LARVA-208 and Water Gamayun) compromised the early access game Chemia on Steam to distribute an infostealer among users.
CONTINUE READING 🡒 Conducting Forensics on Linux: Memory, Disk, and Network Dumping for…
The first task in digital forensics is data collection, specifically acquiring images of hard drives and RAM, as well as network connection dumps if they might be helpful. In this article, we'll explore what needs to be…
CONTINUE READING 🡒 Banking Trojan Coyote Steals Data by Simulating Interface Operations
The new variant of the banking Trojan Coyote exploits accessibility features in Windows, specifically the Microsoft UI Automation framework. In this way, the malware detects banking and cryptocurrency exchange websites visited by the user and steals their…
CONTINUE READING 🡒 Critical Bug Fixed in VINTEO Video Conferencing System
A critical RCE vulnerability has been fixed in the Russian video conferencing system VINTEO. The issue was caused by a feature in the implementation of a component that had insufficient filtering of user data.
CONTINUE READING 🡒 Administrator of XSS Forum Arrested and the Site Shut Down…
The alleged administrator of the Russian-speaking hack forum XSS[.]is was arrested by Ukrainian authorities at the request of the Paris Prosecutor’s Office. Shortly thereafter, the site was shut down by law enforcement agencies.
CONTINUE READING 🡒 Shattered gem. Architecture of Ruby applications and their reverse-engineering
This article discusses the Ruby programming language and reverse-engineering of applications written in it. You will get familiar with useful research tools, learn distinctive features of such programs, and discover a simple way to debug them.
CONTINUE READING 🡒 Enhancing Event Auditing in Windows with Sysmon for Security Experts
Technical specialists who have tried to find crucial information in the log files of Microsoft Windows operating systems, either when investigating cybersecurity incidents or troubleshooting issues, know that event audit logs do not always capture all the…
CONTINUE READING 🡒 Hacker Injected Data Destruction Commands into Amazon’s AI Assistant
A hacker compromised the AI assistant Q by injecting commands that instructed the deletion of data on users’ computers. Amazon included this update in the public release.
CONTINUE READING 🡒 Brave Browser Will Block Windows Recall Functionality
The developers at Brave Software announced that their browser will now block the Windows Recall functionality by default. This ensures that Windows cannot take screenshots of Brave windows, maintaining the privacy of users.
CONTINUE READING 🡒 Zero-Day Vulnerabilities in SharePoint Under Attack Since Early July
According to cybersecurity specialists, several Chinese hacker groups have been exploiting a chain of zero-day vulnerabilities in Microsoft SharePoint in their attacks. In particular, it has become known that the attackers have compromised the network of the…
CONTINUE READING 🡒 Choosing the Right Messenger for Secure and Private Communication
It's paradoxical but true: despite the variety of messaging apps available, we often don't really have a choice—we just use the ones our friends and acquaintances are using. But what if privacy is really important to you?…
CONTINUE READING 🡒 Trojan.Scavenger Disguises Itself as Game Cheats and Mods
Experts at Dr.Web reported on the Trojan.Scavenger malware family, which attackers use to steal data from cryptocurrency wallets and password managers on Windows users. Legitimate applications are used to launch the malware, and vulnerabilities related to DLL…
CONTINUE READING 🡒 Ransomware Group World Leaks Hacks Dell Test Environment but Steals…
The hacker group World Leaks hacked one of Dell’s demonstration platforms and attempted to extort a ransom from the company. Dell reports that the criminals only stole “synthetic” (fake) data.
CONTINUE READING 🡒 Creating a Custom Android ROM from Stock Without Modifying Source…
Building your own firmware from source code is a complex process that requires deep subject knowledge, a powerful computer, and lots of gigabytes of hard drive space. However, it's not always necessary to follow the standard approach.…
CONTINUE READING 🡒 Pavel Durov Warns of Gift and Username Scams on Telegram
Earlier this week, Pavel Durov announced on his Telegram channel that scammers are extorting messenger users by demanding rare gifts, virtual numbers, and usernames.
CONTINUE READING 🡒 F6 Helped Block NyashTeam Hacker Group’s Infrastructure
Analysts at F6 discovered a network of domains used by the group NyashTeam, which distributes malware and provides hosting services to criminals. The group’s clients have attacked users in at least 50 countries worldwide, including Russia. More…
CONTINUE READING 🡒 Unlocking and Accessing Data on iOS Devices
In this article, we will delve into what happens to an iPhone in a forensic lab. We will explore the feasibility of bypassing iOS security across different versions and what tools or methods might be needed in…
CONTINUE READING 🡒 Critical Vulnerability in Nvidia Container Toolkit Poses a Threat to…
Experts from the company Wiz have discovered a critical vulnerability in the Nvidia Container Toolkit. According to the researchers, the issue could pose a significant threat to managed cloud AI services.
CONTINUE READING 🡒 Learning Game Hacking: Developing Cheats with a Simple Example
Video games are great because the reward for success is genuinely satisfying, while the cost of failure is low. However, sometimes to unlock new abilities or simply to speed up gameplay, you might resort to not-so-honest methods.…
CONTINUE READING 🡒