Cyberveille
curated by Decio
Nuage de tags
Mur d'images
Quotidien
Rechercher
Flux RSS
Flux RSS
Daily Feed
Weekly Feed
Monthly Feed
tags
search
Malicious PyPI Package Targets Discord Developers with Remot...
Using Trusted Protocols Against You: Gmail as a C2 Mechanism...
JFrog Detects Malicious PyPi package Stealing Crypto Tokens
Malware found on npm infecting local package with reverse shell
Malicious extensions circumvent Google’s remote code ban
A new playground: Malicious campaigns proliferate from VSCode to npm
Malicious Ads in Search Results Are Driving New Generations of Scams | WIRED
Python Crypto Library Updated to Steal Private Keys
HijackLoader evolution: abusing genuine signing certificates
Hacker plants false memories in ChatGPT to steal user data in perpetuity
Malicious Plugin
China-Linked Hackers Compromise ISP to Deploy Malicious Software Updates
PyPI halted new users and projects while it fended off supply-chain attack
New Go loader pushes Rhadamanthys stealer
GitHub besieged by millions of malicious repositories in ongoing attack | Ars Technica
Disrupting malicious uses of AI by state-affiliated threat actors
Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub
Why Join The Navy If You Can Be A Pirate?
Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled Domains
A pernicious potpourri of Python packages in PyPI
The evolutionary tale of a persistent Python threat
Fake CVE-2023-40477 Proof of Concept Leads to VenomRAT
An Ongoing Open Source Attack Reveals Roots Dating Back To 2021
Security advisory: malicious crate rustdecimal
Hackers exploit gaping Windows loophole to give their malware kernel access
Microsoft Revokes Malicious Drivers in Patch Tuesday Culling
Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks
How malicious extensions hide running arbitrary code
Malicious VSCode extensions with more than 45K downloads steal PII and enable backdoors - Check Point Blog
Threat Actors Rapidly Adopt Web3 IPFS Technology
Qakbot mechanizes distribution of malicious OneNote notebooks
A Noteworthy Threat: How Cybercriminals are Abusing OneNote
Breaking Down the SEO Poisoning Attack | How Attackers Are Hijacking Search Results
Threat Spotlight: XLLing in Excel - threat actors using malicious add-ins
Android SharkBot Droppers on Google Play Underline Platform's Security Needs
Massive ois[.]is Black Hat Redirect Malware Campaign
The Case of Cloud9 Chrome Botnet
Malicious App Developer Remains on Google Play
“Dormant Colors”: Live Campaign With Over 1M Data Stealing Extensions Installed
Malicious WhatsApp mod distributed through legitimate apps
Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users
Investigation report about the abuse of the Mac Appstore | by Privacy1St
CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware
Google Online Security Blog: The Package Analysis Project: Scalable detection of malicious open source packages