Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted modules that are designed to deploy loader malware on Linux and Apple macOS systems.
“The threat actor has published at least seven packages impersonating widely used Go libraries, including one (github[.]com/shallowmulti/hypert) that appears to target financial-sector developers
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-05 08:07:082025-03-05 08:07:08Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-05 01:07:502025-03-05 01:07:50Google Cuts Off uBlock Origin on Chrome as Firefox Stands Firm on Ad Blockers
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-04 23:07:042025-03-04 23:07:04GreyNoise Intelligence Releases New Research on Cybersecurity Vulns
The now-patched bugs are under active exploit and enable attackers to carry out a wide range of malicious activities, including escaping a virtual machine and gaining access to the underlying host.
Amnesty International said Serbian police used an exploit chain in tandem with legitimate mobile extraction dongle from vendor Cellebrite in an attack that brings up questions around ethical technology development.
BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems
/in General NewsCybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted modules that are designed to deploy loader malware on Linux and Apple macOS systems.
“The threat actor has published at least seven packages impersonating widely used Go libraries, including one (github[.]com/shallowmulti/hypert) that appears to target financial-sector developers
The Hacker News – Read More
Google Cuts Off uBlock Origin on Chrome as Firefox Stands Firm on Ad Blockers
/in General NewsThe problem started with Manifest V3, Chrome’s new extension specification, which is supposed to improve privacy.
Security | TechRepublic – Read More
GreyNoise Intelligence Releases New Research on Cybersecurity Vulns
/in General NewsPost Content
darkreading – Read More
Rapid7 Delivers Command Platform Offerings for Exposure Management
/in General NewsPost Content
darkreading – Read More
3 VMware Zero-Day Bugs Allow Sandbox Escape
/in General NewsThe now-patched bugs are under active exploit and enable attackers to carry out a wide range of malicious activities, including escaping a virtual machine and gaining access to the underlying host.
darkreading – Read More
Threat Actor ‘JavaGhost’ Targets AWS Environments in Phishing Scheme
/in General NewsPalo Alto Networks’ Unit 42 details how a threat actor is dodging detection with careful targeting and the use of Amazon’s native email tools.
darkreading – Read More
Avoid unexpected credit card charges with my ultimate online shopping hack
/in General NewsI never use my personal credit card for free trials, and I never share my card info with unfamiliar vendors. Here’s what I do instead.
Latest stories for ZDNET in Security – Read More
Serbian Police Hack Protester’s Phone With Cellebrite Exploit Chain
/in General NewsAmnesty International said Serbian police used an exploit chain in tandem with legitimate mobile extraction dongle from vendor Cellebrite in an attack that brings up questions around ethical technology development.
darkreading – Read More
North Korea’s Latest ‘IT Worker’ Scheme Seeks Nuclear Funds
/in General NewsFraudulent IT workers are looking for engineering and developer positions in the US and Japan, and this time it’s not about espionage.
darkreading – Read More
Hackers launder most of Bybit’s stolen crypto worth $1.4B
/in General NewsExperts note that this is just the first step for the alleged North Korean hackers to profit from the historic heist.
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More