Cybersecurity

Malicious PyPI Package “automslc” Enables 104K+ Unauthorized Deezer Music Downloads 

Malicious PyPI Package “automslc” Enables 104K+ Unauthorized Deezer Music Downloads 

Cybersecurity researchers have flagged a malicious Python library on the Python Package Index (PyPI) repository that facilitates unauthorized music downloads from music streaming service Deezer.
The package in question is automslc, which has been downloaded over 104,000 times to date. First published in May 2019, it remains available on PyPI as of writing.
“Although automslc, which has been

CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation 

CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed two security flaws impacting Microsoft Partner Center and Synacor Zimbra Collaboration Suite (ZCS) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The vulnerabilities in question are as follows –

CVE-2024-49035 (CVSS score: 8.7) – An improper access control

LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile 

LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile 

Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data collection features to extract information from social media platforms like Facebook and Instagram.
LightSpy is the name given to a modular spyware that’s capable of infecting both Windows and Apple systems with an aim to harvest data. It was first documented in

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware 

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware 

Opposition activists in Belarus as well as Ukrainian military and government organizations are the target of a new campaign that employs malware-laced Microsoft Excel documents as lures to deliver a new variant of PicassoLoader. 
The threat cluster has been assessed to be an extension of a long-running campaign mounted by a Belarus-aligned threat actor dubbed Ghostwriter (aka Moonscape,

The AI Fix #39: AIs value their lives over yours, and flattery gets you nowhere 

The AI Fix #39: AIs value their lives over yours, and flattery gets you nowhere 

In episode 39 of the AI Fix, our hosts watch a drone and a robot dog shoot fireworks at each other, xAI launches Grok 3, Mark explains that AIs can design genomes now, a robot starts a punch up, Zuck becomes a mind reader, an AI cracks a ten-year science question in two days, and an anatomically accurate synthetic human recreates a terrifying scene from The Long Good Friday.

Graham learns that it always pays to be polite before running over 15 people with a train, and Mark discovers why AIs value some lives more than others, particularly their own.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

5 Active Malware Campaigns in Q1 2025 

5 Active Malware Campaigns in Q1 2025 

The first quarter of 2025 has been a battlefield in the world of cybersecurity. Cybercriminals continued launching aggressive new campaigns and refining their attack methods.
Below is an overview of five notable malware families, accompanied by analyses conducted in controlled environments.
NetSupport RAT Exploiting the ClickFix Technique
In early 2025, threat actors began exploiting a technique

2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT 

2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT 

A large-scale malware campaign has been found leveraging a vulnerable Windows driver associated with Adlice’s product suite to sidestep detection efforts and deliver the Gh0st RAT malware.
“To further evade detection, the attackers deliberately generated multiple variants (with different hashes) of the 2.0.2 driver by modifying specific PE parts while keeping the signature valid,” Check Point

GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets 

GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets 

Cybersecurity researchers are calling attention to an ongoing campaign that’s targeting gamers and cryptocurrency investors under the guise of open-source projects hosted on GitHub.
The campaign, which spans hundreds of repositories, has been dubbed GitVenom by Kaspersky.
“The infected projects include an automation instrument for interacting with Instagram accounts, a Telegram bot that enables

FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services 

FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services 

Various industrial organizations in the Asia-Pacific (APAC) region have been targeted as part of phishing attacks designed to deliver a known malware called FatalRAT.
“The threat was orchestrated by attackers using legitimate Chinese cloud content delivery network (CDN) myqcloud and the Youdao Cloud Notes service as part of their attack infrastructure,” Kaspersky ICS CERT said in a Monday

Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA 

Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws impacting Adobe ColdFusion and Oracle Agile Product Lifecycle Management (PLM) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The vulnerabilities in question are listed below –

CVE-2017-3066 (CVSS score: 9.8) – A deserialization vulnerability impacting

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X