GitHub

Massive GitHub Leak: 39M API Keys & Credentials Exposed – How to Strengthen SecurityMassive GitHub Leak: 39M API Keys & Credentials Exposed – How to Strengthen Security

Massive GitHub Leak: 39M API Keys & Credentials Exposed – How to Strengthen Security

Over 39 million API keys, credentials, and other sensitive secrets were exposed on GitHub in 2024, raising considerable alarm within…

6 hours ago
Prince Ransomware – An Automated Open-Source Ransomware Builder Freely Available on GitHubPrince Ransomware – An Automated Open-Source Ransomware Builder Freely Available on GitHub

Prince Ransomware – An Automated Open-Source Ransomware Builder Freely Available on GitHub

The cybersecurity landscape has witnessed a concerning development with the emergence of "Prince Ransomware," an open-source ransomware builder that was…

1 day ago
Triton RAT Uses Telegram for Remote System Access and ControlTriton RAT Uses Telegram for Remote System Access and Control

Triton RAT Uses Telegram for Remote System Access and Control

Cado Security Labs has uncovered a new Python-based Remote Access Tool (RAT) named Triton RAT, which leverages Telegram for remote…

3 days ago
SHELBY Malware Steals Data by Abusing GitHub as Command-and-Control ServerSHELBY Malware Steals Data by Abusing GitHub as Command-and-Control Server

SHELBY Malware Steals Data by Abusing GitHub as Command-and-Control Server

Elastic Security Labs has uncovered a sophisticated malware campaign, dubbed REF8685, targeting the Iraqi telecommunications sector. The campaign utilizes a…

6 days ago
CodeQLEAKED: GitHub Supply Chain Attack Enables Code Execution via CodeQL RepositoriesCodeQLEAKED: GitHub Supply Chain Attack Enables Code Execution via CodeQL Repositories

CodeQLEAKED: GitHub Supply Chain Attack Enables Code Execution via CodeQL Repositories

A recent discovery has revealed a potential supply chain attack vulnerability in GitHub's CodeQL repositories, which could have led to…

1 week ago
Beware Developers – Fake Coding Challenges Will Deploy FogDoor on Your SystemBeware Developers – Fake Coding Challenges Will Deploy FogDoor on Your System

Beware Developers – Fake Coding Challenges Will Deploy FogDoor on Your System

Researchers has discovered a sophisticated malware operation that poses as a fake coding challenge and targets Polish-speaking professionals. This campaign,…

1 week ago
Albabat Ransomware Targets Windows, Linux, and macOS via GitHub AbuseAlbabat Ransomware Targets Windows, Linux, and macOS via GitHub Abuse

Albabat Ransomware Targets Windows, Linux, and macOS via GitHub Abuse

Recent research by Trend Micro has uncovered a significant evolution in the Albabat ransomware, which now targets not only Windows…

2 weeks ago
North Korean IT Workers Exploit GitHub to Launch Global CyberattacksNorth Korean IT Workers Exploit GitHub to Launch Global Cyberattacks

North Korean IT Workers Exploit GitHub to Launch Global Cyberattacks

A recent investigation by cybersecurity firm Nisos has uncovered a coordinated effort by North Korean IT workers to exploit GitHub…

2 weeks ago
CISA Warns of Supply-Chain Attack Exploiting GitHub Action VulnerabilityCISA Warns of Supply-Chain Attack Exploiting GitHub Action Vulnerability

CISA Warns of Supply-Chain Attack Exploiting GitHub Action Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm over a critical supply-chain attack affecting a widely used…

2 weeks ago
Supply Chain Attack Targets 23,000 GitHub RepositoriesSupply Chain Attack Targets 23,000 GitHub Repositories

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which is used in over 23,000 repositories.…

2 weeks ago