Category: Information Security

LabHost Threat Actor

Phishing-as-a-Service Threatens Canada’s Banks

LabHost has emerged as a pivotal tool for cybercriminals in their assaults on North American banks, particularly targeting financial institutions in Canada. This Phishing-as-a-Service (PHaaS) provides malefactors with an array of tools for orchestrating...

Safetensors

Hugging Face Vulnerability Exposes AI Models to Attack

Cybersecurity firm HiddenLayer has uncovered a vulnerability in the Safetensors conversion service by Hugging Face, which permits an attacker to intercept AI models uploaded by users, thereby compromising the supply chain. According to HiddenLayer’s...

Xeno RAT

Open-Source Malware: The Xeno RAT Threat Exposed

A new advanced Remote Access Tool (RAT) named Xeno RAT has been published on GitHub. This Trojan, crafted in the C# programming language and compatible with Windows 10 and Windows 11 operating systems, offers...

SubdoMailing

“SubdoMailing”: Major Brands Hacked in Phishing Attack

In the expansive phishing operation dubbed “SubdoMailing,” uncovered by experts from Guardio Labs, over 8,000 subdomains of renowned brands and institutions were compromised by malefactors, including entities such as eBay, VMware, McAfee, The Economist,...

Banking Trojans Google Cloud Run

Banking Trojans Surge on Google Cloud Run

Analysts warn that hackers have increasingly exploited the Google Cloud Run service for the widespread distribution of banking trojans such as Astaroth, Mekotio, and Ousaban. Google Cloud Run enables users to deploy front-end and...

SSH-Snake

Warning: SSH-Snake’s Stealthy Network Invasion

Cybersecurity specialists at Sysdig have unveiled a new malicious entity dubbed SSH-Snake, designed to stealthily search for private keys and navigate through a victim’s infrastructure, rendering it significantly more perilous than conventional viruses that...

Migo malware

Linux Servers Targeted in Redis Cryptomining Campaign

Experts from Cado Security have uncovered a new malicious campaign targeting Redis servers. Once initial access to the systems is secured, the attackers mine cryptocurrency on the compromised Linux-operated hosts. According to Matt Muir,...