A student placed a ransomware on PyPI “just for fun”
Three malicious packages (requesys, requesrs and requesr) were found in the PyPI…
Due to an unknown bug, funds were stolen from thousands of Solana wallets
Users of the Solana platform suffered from an attack that emptied about…
Power semiconductor manufacturer Semikron has been the victim of LV ransomware
German power semiconductor manufacturer Semikron was attacked by ransomware, leaving the company's…
Chinese hackers use Manjusaka instead of Cobalt Strike
Cisco Talos experts have discovered a new offensive framework called Manjusaka, which…
Critical RCE Vulnerability Threatens Nearly 30 DrayTek Router Models
Hundreds of thousands of DrayTek Vigor routers are at risk due to…
Hack group APT31 attacks the Russian fuel and energy complex and the media
In the spring of this year, Positive Technologies specialists detected an attack…
Hackers use Dark Utilities to create C&C infrastructure
Cisco Talos analysts have discovered a new Dark Utilities service that provides…
Many repositories on GitHub are cloned and distribute malware
Developer Stephen Lacy stirred up the community when he announced on Twitter…
Cross-chain bridge Nomad lost $200 million due to hack
A bug in the smart contract cost the Nomad cryptocurrency bridge almost…
Critical Vulnerabilities Fixed in Cisco VPN Routers
Cisco has fixed critical vulnerabilities affecting small business VPN routers that could…