Google on Thursday announced that it's seeking contributors to a new open-source initiative called Graph for Understanding Artifact Composition, also known as GUAC, as part of its ongoing efforts to beef up the software supply chain. read more
5Star-Cybersecurity Uk
Industrial Cyber Security. Digital Marketing Techniques & Cybersecurity , YouTube tips and tricks
Friday, 21 October 2022
Thursday, 6 October 2022
19-Year-Old Hacker Arrested for Using Leaked Optus Breach Data in SMS Scam
The Australian Federal Police (AFP) has arrested a 19-year-old teen from Sydney for allegedly attempting to leverage the data leaked following the Optus data breach late last month to extort victims. read more
Wednesday, 21 September 2022
Over 280,000 WordPress Sites Attacked Using WPGateway Plugin Zero-Day Vulnerability
A zero-day flaw in the latest version of a WordPress premium plugin known as WPGateway is being actively exploited in the wild, potentially allowing malicious actors to completely take over affected sites. read more
Sunday, 4 September 2022
Cybercrime Groups Increasingly Adopting Sliver Command-and-Control Framework
Nation-state threat actors are increasingly adopting and integrating the Sliver command-and-control (C2) framework in their intrusion campaigns as a replacement for Cobalt Strike. read more
Sunday, 21 August 2022
DoNot Team Hackers Updated its Malware Toolkit with Improved Capabilities
The Donot Team threat actor has updated its Jaca Windows malware toolkit with improved capabilities, including a revamped stealer module designed to plunder information from Google Chrome and Mozilla Firefox browsers. read more
Friday, 19 August 2022
Hackers Opting New Attack Methods After Microsoft Blocked Macros by Default
Thursday, 18 August 2022
Cybercriminals Developing BugDrop Malware to Bypass Android Security Features
In a sign that malicious actors continue to find ways to work around Google Play Store security protections, researchers have spotted a previously undocumented Android dropper trojan that's currently in development.
"This new malware tries to abuse devices using a novel technique, not seen before in Android malware, to spread the extremely dangerous Xenomorph banking trojan, allowing criminals to perform On-Device Fraud on victim's devices," ThreatFabric's Han Sahin said in a statement. Dubbed BugDrop by the Dutch security firm, the dropper app is explicitly designed to defeat new features introduced in the upcoming version of Android that aim to make it difficult for malware to request Accessibility Services privileges from victims. read moreGoogle Launches GUAC Open Source Project to Secure Software Supply Chain
Google on Thursday announced that it's seeking contributors to a new open-source initiative called Graph for Understanding Artifact Comp...

-
What is a Script Kiddie? A script kiddie, or skid, is a term that describes a young hacker who has much to learn yet acts as if he or she ...
-
Cryptolocker Virus Definition Cryptolocker is a malware threat that gained notoriety over the last few years. It is a Trojan horse that infe...
-
What is hacktivism? Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individ...