Web3 Game Developers Targeted in Crypto Theft Scheme

From darkreading.com

A Russian threat actor is peppering game developers with fraudulent Web3 gaming projects that drop multiple variants of infostealers on both MacOS and Windows devices.

The ultimate goal of the campaign appears to be defrauding victims and stealing their cryptocurrency wallets, according to Recorded Future’s Insikt Group, which discovered the malicious activity.

Read more…

HTTP/2 Vulnerability Let Hackers Launch DOS Attacks On Web Servers

From gbhackers.com

Researchers identified a significant vulnerability within the HTTP/2 protocol, potentially allowing hackers to launch Denial of Service (DOS) attacks on web servers.

The vulnerability tracked as CVE-2024-28182 has raised concerns among internet security experts and prompted responses from various technology vendors.

The CERT Coordination Center (CERT/CC) disclosed the vulnerability in a vulnerability note VU#421644.

It has been assigned the Common Vulnerabilities and Exposures (CVE) identifier CVE-2024-28182. This security flaw is particularly worrisome because it affects the HTTP/2 protocol, which is widely used for secure communications on the Internet.

Read more…

Google Rolls Out “Find My Device” Network For Android Users

From gbhackers.com

Google has announced the global rollout of its revamped Find My Device network.

This innovative feature is set to transform how Android users locate their misplaced devices and everyday items, leveraging a vast, crowdsourced network of over a billion Android devices.

Here’s a closer look at what this update entails and how it can benefit Android users worldwide.

Read more…

Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks

From thehackernews.com

Threat actors are actively scanning and exploiting a pair of security flaws that are said to affect as many as 92,000 internet-exposed D-Link network-attached storage (NAS) devices.

Tracked as CVE-2024-3272 (CVSS score: 9.8) and CVE-2024-3273 (CVSS score: 7.3), the vulnerabilities impact legacy D-Link products that have reached end-of-life (EoL) status. D-Link, in an advisory, said it does not plan to ship a patch and instead urges customers to replace them.

“The vulnerability lies within the nas_sharing.cgi uri, which is vulnerable due to two main issues: a backdoor facilitated by hard-coded credentials, and a command injection vulnerability via the system parameter,” security researcher who goes by the name netsecfish said in late March 2024.

Read more…

Machine Learning Tutorials Repository – Unlocking The Power Of AI Learning

From kalilinuxtutorials.com

Welcome to the Machine Learning Tutorials Repository! This is the go-to spot for all the code associated with my Twitter tutorials.

If you’re passionate about diving deep into the realms of Machine Learning and exploring various topics, you’re in the right place!

Topics Covered

  1. Python: The core language for almost all things Machine Learning.
  2. Computer Vision: Techniques, algorithms, and methods to give machines the ability to see and interpret visual data.
  3. NLP (Natural Language Processing): Delve into the world of words and understand how machines can comprehend, interpret, and respond to human languages.
  4. Matplotlib: Visualize your data and results with one of the most popular plotting libraries.
  5. NumPy: Master the art of numerical computing with Python.
  6. Pandas: The ultimate tool for data analysis in Python.
  7. MLOps: Learn about the best practices, tools, and services to manage end-to-end ML lifecycle.
  8. LLMs (Large Language Models): Dive deep into state-of-the-art models that understand and generate human-like text.
  9. PyTorch/TensorFlow: Get to grips with the two dominant deep learning frameworks.

Read more…

Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing

From thehackernews.com

Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide range of malware such as Venom RAT, Remcos RAT, XWorm, NanoCore RAT, and a stealer that targets crypto wallets.

The email messages come with Scalable Vector Graphics (SVG) file attachments that, when clicked, activate the infection sequence, Fortinet FortiGuard Labs said in a technical report.

The modus operandi is notable for the use of the BatCloak malware obfuscation engine and ScrubCrypt to deliver the malware in the form of obfuscated batch scripts.

BatCloak, offered for sale to other threat actors since late 2022, has its foundations in another tool called Jlaive. Its primary feature is to load a next-stage payload in a manner that circumvents traditional detection mechanisms.

Read more…

Dissecting Windows Malware Series – Beginner To Advanced – Part 1

From 8ksec.io

We hear about “cyber attacks” in the news every week!  But – what actually happens ‘during’ the attack, what happens in the background, behind the scenes, from the moment the event ‘begins’ until the moment it’s realized something is amiss? Or worse – when it’s not realized something is amiss and things continue on autopilot…

Table of Contents

Read more…