Zephyrnet Logo

Tag: malicious code

Google Warns of North Korea Hacking Group Exploiting Zero-Day Flaw for Internet Explorer

Colin Thierry Published on: December 9, 2022 Google’s Threat Analysis Group (TAG) announced on Wednesday technical details of a...

Google: Use SLSA Framework for Better Software Security

Organizations should implement the Supply Chain Levels for Software Artifacts (SLSA) framework when building software to ensure better software security and integrity, advocates Google...

Cyber Security Options for Supply Chain!

Technology has mainly driven the growth of supply chain operations throughout the years. Organizations of all sizes are migrating to the digital world,...

Life After FTX: How Solana DeFi Is Starting Over—Without SBF’s Serum

The fall of Sam Bankman-Fried didn’t just topple a $32 billion cryptocurrency exchange in FTX—it also threatened to undo the fabric of decentralized finance...

Will New CISA Guidelines Help Bolster Cyber Defenses?

Do you know what IT devices are in your business or on your network right now? If not, you may have cybercriminals and the...

Attackers use name of lead exchanges to target crypto startups

Tech giant Microsoft uncovered an attack targeting crypto startups using a pdf file that uses the names OKX, Binance, and Huobi.The...

LastPass Discloses Second Breach in Three Months

An attacker who breached the software development environment at LastPass this August and stole source code and other proprietary data from the company appears...

Artifact Poisoning in GitHub Actions Imports Malware via Software Pipelines

An attacker submitting changes to an open source repository on GitHub could cause downstream software projects that include the latest version of a component...

IBM Cloud Supply Chain Vulnerability Showcases New Threat Class

A vulnerability in IBM Cloud databases for PostgreSQL could have allowed attackers to launch a supply chain attack on cloud customers by breaching internal...

Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin

ESET researchers uncover Dolphin, a sophisticated backdoor extending the arsenal of the ScarCruft APT group ESET researchers have analyzed a previously unreported...

Chrome fixes 8th zero-day of 2022 – check your version now

by Paul Ducklin Google has just patched Chrome’s eighth zero-day hole of the year so far. Zero-days are bugs for which...

How Development Teams Should Respond to Text4Shell

A family moves into their dream home, only to be plagued by ominous letters, a strange tenant, and sinister threats. Sound familiar?It should. This...

Latest Intelligence

spot_img
spot_img