Μετάβαση στο περιεχόμενο
Αρχική
Σχετικά με εμάς
Η ομάδα μας
Πηγές
Οι υπηρεσίες μας
Endpoint Detection & Response
Εκπαίδευση στην Κυβερνοασφάλεια
Αξιολογήσεις ασφάλειας
Λύσεις ασφάλειας
Γιατί Raven?
Blog
Επικοινωνία
X
The Hacker News
U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network
16 Ιουνίου, 2025
The U.S. Department of Justice (DoJ) said it has filed a civil forfeiture complaint in federal court that targets over $7.74 million in cryptocurrency, non-fungible tokens (NFTs), and other digital assets allegedly linked to a global IT worker scheme orchestrated by North Korea. "For years, North Korea has exploited global remote IT contracting and cryptocurrency […]
Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment
16 Ιουνίου, 2025
An emerging ransomware strain has been discovered incorporating capabilities to encrypt files as well as permanently erase them, a development that has been described as a "rare dual-threat." "The ransomware features a 'wipe mode,' which permanently erases files, rendering recovery impossible even if the ransom is paid," Trend Micro researchers Maristel Policarpio, Sarah Pearl Camiling, […]
⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
16 Ιουνίου, 2025
Some of the biggest security problems start quietly. No alerts. No warnings. Just small actions that seem normal but aren't. Attackers now know how to stay hidden by blending in, and that makes it hard to tell when something’s wrong. This week’s stories aren’t just about what was attacked—but how easily it happened. If we’re […]
Playbook: Transforming Your Cybersecurity Practice Into An MRR Machine
16 Ιουνίου, 2025
Introduction The cybersecurity landscape is evolving rapidly, and so are the cyber needs of organizations worldwide. While businesses face mounting pressure from regulators, insurers, and rising threats, many still treat cybersecurity as an afterthought. As a result, providers may struggle to move beyond tactical services like one-off assessments or compliance checklists, and demonstrate
PyPI, npm, and AI Tools Exploited in Malware Surge Targeting DevOps and Cloud Environments
16 Ιουνίου, 2025
Cybersecurity researchers from SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compat (676 Downloads) ts-runtime-compat-check (1,588 Downloads) solders (983 Downloads) @mediawave/lib (386 Downloads) All the identified npm
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Katz Stealer Boosts Credential Theft with System Fingerprinting and Persistence Mechanisms
16 Ιουνίου, 2025
The emergence of Katz Stealer, a sophisticated information-stealing malware-as-a-service (MaaS) that is redefining the boundaries of credential theft. First detected this year, Katz Stealer combines aggressive data exfiltration with advanced system fingerprinting, stealthy persistence mechanisms, and evasive loader tactics. Distributed primarily through phishing emails and fake software downloads, this malware targets a vast array of […]
Washington Post Hacked – Multiple Journalists’ Email Accounts Compromised
16 Ιουνίου, 2025
The Washington Post confirmed late last week that its email systems were targeted in a cyberattack, resulting in the compromise of several journalists’ email accounts. “The Wall Street Journal, which first reported the breach, said it was potentially the work of a foreign government.” The attack, discovered on Thursday evening, affected Microsoft email accounts belonging […]
Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS Tokens and Sensitive Data
16 Ιουνίου, 2025
The JFrog Security Research team has uncovered a sophisticated malicious package named “chimera-sandbox-extensions” on the Python Package Index (PyPI), a widely used repository for Python software. Uploaded by a user identified as “chimerai,” this package was designed to exploit unsuspecting developers by targeting users of the chimera-sandbox environment, aiming to harvest sensitive credentials and critical […]
Malicious Payload Found in JPEG Image Using Steganography and Base64 Obfuscation
16 Ιουνίου, 2025
Cybersecurity enthusiast Xavier shed light on a sophisticated method of hiding malicious payloads within seemingly innocuous JPEG images. This discovery has sparked significant interest in the infosec community, as it highlights the growing complexity of cyber threats leveraging steganography the art of concealing data within other data. Through dynamic analysis, researchers can uncover these hidden […]
Hackers Target and Hijack Washington Post Journalists’ Email Accounts
16 Ιουνίου, 2025
A targeted cyberattack has struck The Washington Post, compromising the email accounts of several of its journalists and raising new concerns about the digital security of newsrooms worldwide. The breach, discovered late last week, prompted an immediate and sweeping response from the newspaper’s leadership, including a reset of all employee login credentials and the launch […]