Nexus offers overlay attacks and keylogging activities designed to steal victims’ credentials
More Stories
Other Attempts to Take Over Open Source Projects
After the XZ Utils discovery, people have been examining other open-source projects. Surprising no one, the incident is not unique:...
Trust in Cyber Takes a Knock as CNI Budgets Flatline
Bridewell report reveals critical infrastructure firms are losing faith in their defensive tooling Read More
UK Police Lead Disruption of £1m Phishing-as-a-Service Site LabHost
The Metropolitan Police and partners have disrupted the prolific LabHost phishing-as-a-service platform Read More
Smashing Security podcast #368: Gary Barlow, and a scam turns deadly
Take That's Gary Barlow chats up a pizza-slinging granny from Essex via Facebook, or does he? And a scam takes...
Redline Stealer: A Novel Approach
A new packed variant of the Redline Stealer trojan was observed in the wild, leveraging Lua bytecode to perform malicious...
Linux Cerber Ransomware Variant Exploits Atlassian Servers
The attacks exploit CVE-2023-22518, a critical flaw in Atlassian Confluence Data Center and Server Read More