Hackers use CAPTCHA bypass to make 20K GitHub accounts in a month

Hackers use CAPTCHA bypass to make 20K GitHub accounts in a month

Hackers use CAPTCHA bypass to make 20K GitHub accounts in a month Post Views: 2 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes According to Palo Alto Networks Unit 42, the threat actors use a new CAPTCHA solving system, follow a...
New SHC-compiled Linux malware installs cryptominers, DDoS bots

New SHC-compiled Linux malware installs cryptominers, DDoS bots

New SHC-compiled Linux malware installs cryptominers, DDoS bots Post Views: 19 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes A new Linux malware downloader created using SHC (Shell Script Compiler) has been spotted in the wild,...
PyTorch Framework compromised with dependency confusion attack

PyTorch Framework compromised with dependency confusion attack

PyTorch Framework compromised with dependency confusion attack Post Views: 2 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes The maintainers of the PyTorch package have warned users who have installed the nightly builds of the...
Google Home speakers allowed hackers to snoop on conversations

Google Home speakers allowed hackers to snoop on conversations

Google Home speakers allowed hackers to snoop on conversations Post Views: 13 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes A bug in Google Home smart speaker allowed installing a backdoor account that could be used to control it...