GitHub Fixes Vulnerability, Secures Repositories

GitHub Vulnerability Fixed

According to fresh data, a new vulnerability reported on GitHub could have put thousands of repositories at risk of repo jacking assaults. The vulnerability “could allow an attacker to exploit a race condition within GitHub’s repository creation and username renaming operations,” according to Checkmarx security researcher Elad Rapoport in a technical paper published with The … Read more

Facebook Messenger Phishing Attack Unleashes Python-Based Stealer Malware

Facebook Messenger Phishing Attack: How attackers hijack user accounts A new phishing effort is exploiting Facebook Messenger to spread messages with malicious attachments from a “swarm of fake and hijacked personal accounts” with the ultimate goal of gaining control of the targets’ accounts. “Originating yet again from a Vietnamese-based group, this campaign uses a tiny … Read more

Apple Emergency Updates: Defend Yourself Against Pegasus Spyware Exploits

Apple Emergency Updates: Defending Against Pegasus Spyware Exploits

Discover the Apple Emergency Updates to Counter Pegasus Spyware Exploits On Thursday, Apple published critical security patches for iOS, iPadOS, macOS, and watchOS to fix two zero-day holes that have been used to distribute mercenary spyware from NSO Group called Pegasus in the wild. The problems are listed below: CVE-2023-41061 – A validation flaw in … Read more

Unmasking Advanced Installer Crypto-Mining Malware

Unmasking Advanced Installer Crypto-Mining Malware

Discover how legitimate software is exploited for cryptocurrency mining. Insights on Advanced Installer crypto-mining malware and its impact on targeted industries. Threat actors have been using Advanced Installer Crypto-Mining Malware, a legal Windows application for building software packages, since at least November 2021 to install cryptocurrency-mining malware on affected computers. " The attacker uses Advanced … Read more