Blue Locker Ransomware lança ataques direcionados ao setor de petróleo e gás no Paquistão

Blue Locker Ransomware Launches Targeted Attacks on the Oil and Gas Sector in Pakistan

A equipe nacional de resposta a emergências cibernéticas do Paquistão (NCERT) emitiu um aviso de alto alerta para 39 ministérios e instituições-chave, alertando de riscos graves do ransomware do “Locker Blue”, que comprometeu a infraestrutura crítica, incluindo a Pakistan Petroleum Limited (PPL) no setor de petróleo e óculos. Os ataques, coincidindo com o Dia da … Ler mais

Os atores de ameaças exploram o arquivo de índice de ajuda da Microsoft para implantar malware pipemagic

UAC-0099 Hackers Weaponize HTA Files to Deploy MATCHBOIL Loader Malware

Os pesquisadores de segurança cibernética descobriram uma campanha sofisticada, onde os atores de ameaças aproveitam um arquivo de índice de ajuda da Microsoft (.MSHI) para implantar o backdoor Pipemagic, marcando uma evolução notável nos métodos de entrega de malware. Esse desenvolvimento se vincula à exploração do CVE-2025-29824, uma elevação de vulnerabilidade de privilégios de dia … Ler mais

ERMAC Android malware source code leak exposes banking trojan infrastructure

ERMAC Android malware source code leak exposes banking trojan infrastructure

The source code for version 3 of theERMACAndroid banking trojanhas been leaked online, exposing the internals of the malware-as-a-service platform and the operator’s infrastructure. The code base was discovered in an open directory by Hunt.io researchers while scanning for exposed resourcesin March 2024. They located an archive named Ermac 3.0.zip, which contained the malware’s code, … Ler mais

AI for Cybersecurity: Building Trust in Your Workflows

AI for Cybersecurity: Building Trust in Your Workflows

AI for Cybersecurity: Building Trust in Your Workflows In cybersecurity, speed matters, but trust is crucial. AI must ensure both rapid response and reliable decisions to avoid errors and disruption. In cybersecurity, speed matters. But speed without trust can be just as dangerous – if not more so – as no action at all. A … Ler mais

Pacote python armado "Termncolor" Usa a chave do Windows Run para persistência

Weaponized Python Package "termncolor" Uses Windows Run Key for Persistence

Especialistas em segurança cibernética descobriram um complexo ataque da cadeia de suprimentos que se originou do Python Package Index (PYPI) em uma recente divulgação do ZSCaler AmeaMlabz. O pacote em questão, denominado “TermNColor”, se disfarça de utilitário de cores benignas para terminais Python, mas importa secretamente uma dependência maliciosa chamada “Colorinal”. Essa dependência serve como … Ler mais

USB Malware Campaign Spreads Cryptominer Worldwide

USB Malware Campaign Spreads Cryptominer Worldwide

A multi-stage malware attack delivered via infected USB devices has been identified, raising concerns over the persistence of cryptomining threats in 2025. Analysts from CyberProof’s Managed Detection and Response (MDR) team discovered that the campaign used DLL search order hijacking and PowerShell to bypass security controls before attempting to install a cryptominer. The malware was … Ler mais

UK sentences “serial hacker” of 3,000 sites to 20 months in prison

Picus Blue Report 2025

A 26-year old in the UK who claimed to have hacked thousands of websites wassentenced to 20 months in prison after pleading guilty earlier this year. Al-Tahery Al-Mashriky ofRotherham, UK, was arrested in 2022 based on information received from U.S. law enforcement and charged for stealing log in details of millions of Facebook users, and … Ler mais

Over 800 N-able servers left unpatched against critical flaws

Picus Blue Report 2025

Over 800 N-able N-central servers remain unpatched against a pair of critical security vulnerabilities tagged as actively exploited last week. N-central is a popular platform used by many managed services providers (MSPs) and IT departments to monitor and manage networks and devices from a centralized web-based console. Tracked as CVE-2025-8875 and CVE-2025-8876, the two flaws … Ler mais

Os atores de ameaças exploram o telegrama como o canal de comunicação para exfiltrar dados roubados

Threat Actors Exploit Telegram as the Communication Channel to Exfiltrate Stolen Data

A TLAB Technologies, uma empresa sediada no Cazaquistão especializada em prevenção avançada de ameaças, descobriu uma das primeiras tentativas de phishing conhecidas na região que direcionava clientes do setor público em um recente incidente de segurança cibernética. O ataque alavancou uma página de login falsa profissionalmente criada para colher credenciais do usuário, empregando a API … Ler mais

Popular npm Package Compromised in Phishing Attack

Popular npm Package Compromised in Phishing Attack

A significant security incident involving the widely used npm package “eslint-config-prettier” has been uncovered. The package, downloaded more than 3.5 billion times, was compromised on July 18 after its maintainer fell victim to a phishing campaign. ReversingLabs’automated detection system and the Socket research team reported the attack the same day. Malicious versions of the package, … Ler mais