CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization
Summary
The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) are issuing this Cybersecurity Advisory to p
#StopRansomware: Interlock
Summary
Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail v
Russian GRU Targeting Western Logistics Entities and Technology Companies
Executive Summary
This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies
BRICKSTORM Backdoor
Malware Analysis at a Glance
| Malware Name | BRICKSTORM |
|---|---|
| Original Publicati
Mehr lesen →
soc
MAR-251132.c1.v1 Exploitation of SharePoint VulnerabilitiesNotificationThis report is provided „as is“ for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kin
soc
MAR-25993211-r1.v2 Ivanti Connect Secure (RESURGE)NotificationThis report is provided „as is“ for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kin
soc
Infamous Chisel Malware Analysis ReportInfamous Chisel–A collection of components associated with Sandworm designed to enable remote access and exfiltrate information from Android phones.Executive Summary
soc
LeakBase Forum Admin Arrested by Russian Authorities in Global Cybercrime OperationRussian law enforcement agencies have successfully apprehended the suspected administrator of LeakBase, a prominent international cybercrime forum. The arrest, executed by officers from the Russian Ministry of Internal Affairs (MVD) alongside regional security services in Rostov, marks a significant disruption to the global underground trade of stolen data. The suspect, a resident of Taganrog, is […] The post LeakBase Forum Admin Arrested by Russian Authorities in Global Cybercrime Operation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
soc
Microsoft Unveils New Guidance to Detect and Defend Against Trivy Supply Chain AttackAqua Security’s vulnerability scanner, Trivy, suffered a sophisticated CI/CD supply chain compromise. The threat actor, identified as TeamPCP, leveraged prior incomplete remediation to inject credential-stealing malware into official releases. This incident, tracked as CVE-2026-33634, successfully weaponized a trusted security tool against the organizations relying on it to stay safe. This visualizes the attack propagation timeline […] The post Microsoft Unveils New Guidance to Detect and Defend Against Trivy Supply Chain Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
soc
Fake VS Code Security Alerts on GitHub Spread Malware in Massive Phishing AttackA large-scale phishing campaign is actively targeting developers on GitHub by abusing the platform’s Discussions feature to distribute fake Visual Studio Code (VS Code) security alerts. The campaign appears highly coordinated, with thousands of near-identical posts discovered across multiple repositories, indicating automated mass exploitation rather than isolated abuse. Attackers are creating GitHub Discussions with alarming […] The post Fake VS Code Security Alerts on GitHub Spread Malware in Massive Phishing Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform. |