-
Definition: Malware can collect credentials in browser file using sqlite3
Source: https://blog.cyble.com/2023/05/03/new-kekw-malware-variant-identified-in-pypi-package-distribution/
Sample:
```pyth…
-
1. The following doesn't go into detail on if these are symmetric or public key operations and if there are significant changes between older and newer TPMs.
> Studies have also been done on the …
-
Crowdstrike antivirus flags ScreenToGif as virus
(Sorry, not sure if it´s ok to report this as a "bug")
Steps to reproduce the behavior:
1. Try to install ScreedToGif on computer with Crowdstrike…
-
## About accounts on [capesandbox.com](https://capesandbox.com/)
* Issues isn't the way to ask for account activation. Ping capesandbox in [Twitter](https://twitter.com/capesandbox) with your usernam…
-
An updated version of an information stealer malware known as Jupyter has resurfaced with "simple yet impactful changes" that aim to stealthily establish a persistent foothold on compromised systems…
-
A variant of a ransomware strain known as DJVU has been observed to be distributed in the form of cracked software.
"While this attack pattern is not new, incidents involving a DJVU variant that app…
-
:point_down:
-
#### Don't worry, this half-baked Python script is for educational purposes onl-hahaha
Infosec bods have detailed an underground cybersecurity tool dubbed Predator AI that not only can be used to c…
-
After taking a look at this, it seems it's overly-complex and not clear, for something that should only serve a simple purpose: "proving the user requests are coming from his browser where he initiall…
el1s7 updated
5 months ago
-
A new information stealer named ExelaStealer has become the latest entrant to an already crowded landscape filled with various off-the-shelf malware designed to capture sensitive data from compromis…