Category: Information Security

Bifrost malware

Bifrost Trojan Targets Linux with VMware Deception

A new Linux version of the Bifrost remote access trojan has emerged, employing a suite of novel camouflage techniques. Among its primary tools is a deceptive domain, mimicking the legitimate VMware. First identified two...

Anycubic 3D printers vulnerability

Security Alert: Anycubic Printers Vulnerable to Hackers

Information has surfaced online that internet-connected 3D printers by Anycubic have been hacked to alert users to a critical vulnerability within the devices. The hacker added a file named “hacked_machine_readme.gcode,” which typically contains instructions...

Chinese cyber-espionage

UnitedHealth Attack: Hospitals Lose Millions Per Day

Last week, a cyberattack on a UnitedHealth Group division disrupted medication distribution and insurance processes in pharmacies across the United States, causing significant challenges for healthcare workers. Experts warn that the incident could lead...

Pegasus spyware Jordan

“The A-Team”: Foreign Spies Target Australia

In Australia, the threat of espionage and foreign interference has escalated to unprecedented levels, warns Mike Burgess, the Director-General of the Australian Security Intelligence Organisation (ASIO). He expressed his concern that an increasing number...

malicious packages

Lazarus Group Targets Python Developers with Malicious Packages

The North Korea-supported hacker group Lazarus has uploaded four malicious packages to the Python Package Index (PyPI) repository, aiming to infect developers’ systems with malevolent software. The implicated packages—“pycryptoenv,” “pycryptoconf,” “quasarlib,” and “swapmempool”—have been...

AMOS Stealer

Warning: AMOS Stealer Variant Targets macOS

Specialists at Bitdefender have discovered a new variant of the malicious software AMOS Stealer (or Atomic Stealer), one of the most prevalent cyber threats for macOS users over the past year. According to Bitdefender...

LabHost Threat Actor

Phishing-as-a-Service Threatens Canada’s Banks

LabHost has emerged as a pivotal tool for cybercriminals in their assaults on North American banks, particularly targeting financial institutions in Canada. This Phishing-as-a-Service (PHaaS) provides malefactors with an array of tools for orchestrating...

Safetensors

Hugging Face Vulnerability Exposes AI Models to Attack

Cybersecurity firm HiddenLayer has uncovered a vulnerability in the Safetensors conversion service by Hugging Face, which permits an attacker to intercept AI models uploaded by users, thereby compromising the supply chain. According to HiddenLayer’s...