March 3, 2024 at 06:53PM

■■■□□ Lazarus Exploits Typos to Sneak PyPI Malware into Dev Systems. The notorious North Korean state-backed hacking group Lazarus uploaded four packages to the Python Package Index (PyPI) repository with the goal of infecting developer systems with malware. https://thehackernews.com/2024/02/lazarus-exploits-typos-to-sneak-pypi.html https://t.me/cKure/13589

March 3, 2024 at 05:54PM

■■■■■ DarkWidow : a Dropper/Post Exploitation Tool targeting Windows (Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process + PPID spoofing + Api resolving from TIB + API hashing).…

March 2, 2024 at 07:58PM

■■□□□ Data-Leak: Epic Games, DJI, Shein, and Kick claimed by Mogilevich ransom gang. https://cybernews.com/news/epic-games-dji-shein-kick-claimed-by-mogilevich/ https://t.me/cKure/13586

March 2, 2024 at 04:51PM

■■■■■ Iran based Cyber-War against its adversaries avoid ongoing genocide and extermination of Muslims and Christians in Gaza and West-Bank, Palestine by the Zionist Jews of Israel and their supporters (United States When Cats Fly: Suspected Iranian Threat Actor UNC1549 Targets Israeli and Middle East Aerospace and Defense Sectors. https://www.mandiant.com/resources/blog/suspected-iranian-unc1549-targets-israel-middle-east https://t.me/cKure/13585

March 2, 2024 at 01:56PM

■■■■□ Researchers found a zero-click Facebook account takeover A critical vulnerability in Facebook could have allowed threat actors to hijack any Facebook account, researcher warns. https://securityaffairs.com/159782/hacking/zero-click-facebook-account-takeover.html https://t.me/cKure/13582

March 2, 2024 at 01:07PM

■□□□□ SSH3: Faster and rich secure shell using HTTP/3, checkout our article here. https://arxiv.org/abs/2312.08396 https://datatracker.ietf.org/doc/draft-michel-ssh3/ https://t.me/cKure/13581

March 2, 2024 at 01:36AM

■■■■■ Lazarus Group observed exploiting an admin-to-kernel Windows zero-day. https://www.scmagazine.com/news/lazarus-group-observed-exploiting-an-admin-to-kernel-windows-zero-day https://t.me/cKure/13580