The Hacker News
China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Global Targets, 5 Malware Families
The China-linked advanced persistent threat (APT) group. known as Aquatic Panda has been linked to a "global espionage campaign" that took place in 2022 targeting seven organizations.
These entities include governments, catholic charities, non-governmental organizations (NGOs), and think tanks across Taiwan, Hungary, Turkey, Thailand, France, and the United States. The activity, which took place
China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Global Targets, 5 Malware Families
The China-linked advanced persistent threat (APT) group. known as Aquatic Panda has been linked to a "global espionage campaign" that took place in 2022 targeting seven organizations.
These entities include governments, catholic charities, non-governmental organizations (NGOs), and think tanks across Taiwan, Hungary, Turkey, Thailand, France, and the United States. The activity, which took place
The Hacker News
Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates
The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation have been observed using a malicious driver dubbed ABYSSWORKER as part of a bring your own vulnerable driver (BYOVD) attack designed to disable anti-malware tools.
Elastic Security Labs said it observed a Medusa ransomware attack that delivered the encryptor by means of a loader packed using a packer-as-a-service (PaaS
Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates
The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation have been observed using a malicious driver dubbed ABYSSWORKER as part of a bring your own vulnerable driver (BYOVD) attack designed to disable anti-malware tools.
Elastic Security Labs said it observed a Medusa ransomware attack that delivered the encryptor by means of a loader packed using a packer-as-a-service (PaaS
The Hacker News
UAT-5918 Targets Taiwan's Critical Infrastructure Using Web Shells and Open-Source Tools
Threat hunters have uncovered a new threat actor named UAT-5918 that has been attacking critical infrastructure entities in Taiwan since at least 2023.
"UAT-5918, a threat actor believed to be motivated by establishing long-term access for information theft, uses a combination of web shells and open-sourced tooling to conduct post-compromise activities to establish persistence in victim
UAT-5918 Targets Taiwan's Critical Infrastructure Using Web Shells and Open-Source Tools
Threat hunters have uncovered a new threat actor named UAT-5918 that has been attacking critical infrastructure entities in Taiwan since at least 2023.
"UAT-5918, a threat actor believed to be motivated by establishing long-term access for information theft, uses a combination of web shells and open-sourced tooling to conduct post-compromise activities to establish persistence in victim
The Hacker News
U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe
The U.S. Treasury Department has announced that it's removing sanctions against Tornado Cash, a cryptocurrency mixer service that has been accused of aiding the North Korea-linked Lazarus Group to launder their ill-gotten proceeds.
"Based on the Administration's review of the novel legal and policy issues raised by use of financial sanctions against financial and commercial activity occurring
U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe
The U.S. Treasury Department has announced that it's removing sanctions against Tornado Cash, a cryptocurrency mixer service that has been accused of aiding the North Korea-linked Lazarus Group to launder their ill-gotten proceeds.
"Based on the Administration's review of the novel legal and policy issues raised by use of financial sanctions against financial and commercial activity occurring
The Hacker News
Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories' CI/CD Secrets Exposed
The supply chain attack involving the GitHub Action "tj-actions/changed-files" started as a highly-targeted attack against one of Coinbase's open-source projects, before evolving into something more widespread in scope.
"The payload was focused on exploiting the public CI/CD flow of one of their open source projects – agentkit, probably with the purpose of leveraging it for further compromises,"
Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories' CI/CD Secrets Exposed
The supply chain attack involving the GitHub Action "tj-actions/changed-files" started as a highly-targeted attack against one of Coinbase's open-source projects, before evolving into something more widespread in scope.
"The payload was focused on exploiting the public CI/CD flow of one of their open source projects – agentkit, probably with the purpose of leveraging it for further compromises,"
About Us – Clay Tech Solutions
At Clay Tech Solutions, we are dedicated to delivering cutting-edge technology solutions in cybersecurity, ethical hacking, web development, and digital security tools. Our team of experts is committed to securing digital assets, building custom-coded websites, and developing advanced security tools to protect businesses and individuals from cyber threats.
With expertise in penetration testing, vulnerability assessments, and secure web development, we ensure that every project we handle is optimized for both performance and security. Our solutions are designed to empower businesses, enhance online protection, and provide innovative tools for security professionals.
At Clay Tech Solutions, security is not just a service—it’s our mission. Whether you need a secure website, ethical hacking training, or advanced cybersecurity tools, we are here to help. Let’s build a safer digital world together!
contact info
mail: info.claygroup@gmail.com
site: under dev
At Clay Tech Solutions, we are dedicated to delivering cutting-edge technology solutions in cybersecurity, ethical hacking, web development, and digital security tools. Our team of experts is committed to securing digital assets, building custom-coded websites, and developing advanced security tools to protect businesses and individuals from cyber threats.
With expertise in penetration testing, vulnerability assessments, and secure web development, we ensure that every project we handle is optimized for both performance and security. Our solutions are designed to empower businesses, enhance online protection, and provide innovative tools for security professionals.
At Clay Tech Solutions, security is not just a service—it’s our mission. Whether you need a secure website, ethical hacking training, or advanced cybersecurity tools, we are here to help. Let’s build a safer digital world together!
contact info
mail: info.claygroup@gmail.com
site: under dev
🔥 Ethical Hacker & Full-Stack Web Developer for Hire! 🔥
Looking for top-notch cybersecurity services or a custom-built website? I specialize in:
✅ Ethical Hacking & Cybersecurity – Security audits, vulnerability assessments, penetration testing, and account recovery.
✅ Full-Stack Web Development – Custom websites, e-commerce stores, and professional web solutions.
✅ Hacking Tools & Cybersecurity Solutions – Advanced tools for security testing and digital protection.
Why Choose Me?
✔ 100% Ethical & Professional
✔ Fast & Reliable Service
✔ Custom Solutions for Your Needs
📩 DM me now for a consultation! Let’s secure and build your digital future.
#EthicalHacker #Cybersecurity #WebDevelopment #HackerForHire #SecureYourBusiness #WebDev
@claysecure23
@claysecure22
@claysecure24
@claysecure25
Looking for top-notch cybersecurity services or a custom-built website? I specialize in:
✅ Ethical Hacking & Cybersecurity – Security audits, vulnerability assessments, penetration testing, and account recovery.
✅ Full-Stack Web Development – Custom websites, e-commerce stores, and professional web solutions.
✅ Hacking Tools & Cybersecurity Solutions – Advanced tools for security testing and digital protection.
Why Choose Me?
✔ 100% Ethical & Professional
✔ Fast & Reliable Service
✔ Custom Solutions for Your Needs
📩 DM me now for a consultation! Let’s secure and build your digital future.
#EthicalHacker #Cybersecurity #WebDevelopment #HackerForHire #SecureYourBusiness #WebDev
@claysecure23
@claysecure22
@claysecure24
@claysecure25
Follow us on instagram for more teach and ethical hacking related content
https://www.instagram.com/h4cker.in
https://www.instagram.com/h4cker.in
Clay Tech Solutions pinned «🔥 Ethical Hacker & Full-Stack Web Developer for Hire! 🔥 Looking for top-notch cybersecurity services or a custom-built website? I specialize in: ✅ Ethical Hacking & Cybersecurity – Security audits, vulnerability assessments, penetration testing, and account…»
🚀 Buy Crypto Instantly via UPI – Fast, Secure & Trusted! 🚀
💰 Want to Buy Bitcoin, Ethereum, or USDT? Now it's easier than ever!
✅ Send INR via UPI
✅ Get Crypto in Your Wallet Instantly
✅ Lowest Fees & Fast Transactions
✅ 100% Safe & Trusted Service
📩 DM Now to Buy Crypto Hassle-Free!
🔗 Contact: @claysecure22
💰 Want to Buy Bitcoin, Ethereum, or USDT? Now it's easier than ever!
✅ Send INR via UPI
✅ Get Crypto in Your Wallet Instantly
✅ Lowest Fees & Fast Transactions
✅ 100% Safe & Trusted Service
📩 DM Now to Buy Crypto Hassle-Free!
🔗 Contact: @claysecure22
🚀 Clay Crypto Exchange – Instant Crypto with UPI! 🔥
💰 Seamless Crypto Purchases – No Hassle!
📲 Pay via UPI & Receive Crypto Instantly
🔒 Secure, Reliable & Trusted Transactions
⚡ No Lengthy KYC – Quick & Efficient Service
💵 Best Exchange Rates & Low Fees
✅ Bitcoin, Ethereum, USDT & More Available
📞 24/7 Support for Smooth Transactions
Experience the fastest and most secure way to buy crypto with Clay Crypto Exchange!
Contact us now to get started! 🚀
Dm for exchanges
@claysecure22
💰 Seamless Crypto Purchases – No Hassle!
📲 Pay via UPI & Receive Crypto Instantly
🔒 Secure, Reliable & Trusted Transactions
⚡ No Lengthy KYC – Quick & Efficient Service
💵 Best Exchange Rates & Low Fees
✅ Bitcoin, Ethereum, USDT & More Available
📞 24/7 Support for Smooth Transactions
Experience the fastest and most secure way to buy crypto with Clay Crypto Exchange!
Contact us now to get started! 🚀
Dm for exchanges
@claysecure22
🚀 Clay CyberTech – Your One-Stop Solution for Cybersecurity, Web Development & Crypto! 🔥
🔹 Cybersecurity & Ethical Hacking
✔ Social Media Recovery & Security
✔ Ethical Hacking Courses & Tools
✔ Vulnerability Testing & Security Solutions
✔ Advanced Remote Admin & Monitoring Tools
🔹 Web Development & Custom Solutions
✔ Professional Website Development (WordPress & Custom Coded)
✔ Secure Shopping Websites (No Database Required)
✔ Custom Web Tools & Automation Scripts
🔹 Crypto Exchange Services
✔ Buy Bitcoin, Ethereum, USDT & More with UPI
✔ Fast & Secure Transactions – No Hassle
🔹 Design & Content Creation
✔ High-Quality Thumbnail & Graphic Design
💼 Why Choose Clay CyberTech?
✅ Fast, Secure, & Reliable Services
✅ Affordable Pricing & Custom Solutions
✅ 24/7 Support & Trusted Expertise
📩 Contact Us Today & Get Started! 🚀
@claysecure22
🔹 Cybersecurity & Ethical Hacking
✔ Social Media Recovery & Security
✔ Ethical Hacking Courses & Tools
✔ Vulnerability Testing & Security Solutions
✔ Advanced Remote Admin & Monitoring Tools
🔹 Web Development & Custom Solutions
✔ Professional Website Development (WordPress & Custom Coded)
✔ Secure Shopping Websites (No Database Required)
✔ Custom Web Tools & Automation Scripts
🔹 Crypto Exchange Services
✔ Buy Bitcoin, Ethereum, USDT & More with UPI
✔ Fast & Secure Transactions – No Hassle
🔹 Design & Content Creation
✔ High-Quality Thumbnail & Graphic Design
💼 Why Choose Clay CyberTech?
✅ Fast, Secure, & Reliable Services
✅ Affordable Pricing & Custom Solutions
✅ 24/7 Support & Trusted Expertise
📩 Contact Us Today & Get Started! 🚀
@claysecure22
💀 Underground Hacking Services – No Limits, No Rules 💀
🔹 Social Media Takeover – Any Account, Any Platform
🔹 Website & Database Exploits – Full Access Guaranteed
🔹 Remote Access Tools – Control Any System
🔹 DDoS Attacks – Take Down Any Target Instantly
🔹 Crypto & Financial Hacks – Anonymous Transactions
🔹 Custom Malware & Exploits – Tailored for Your Needs
💼 Why Us?
✅ No Logs, No Traces, 100% Secure
✅ Anonymous Payment – Crypto Only
✅ Fast & Efficient – Results in Hours
📩 Contact Us on Encrypted Chat Only
🔹 Social Media Takeover – Any Account, Any Platform
🔹 Website & Database Exploits – Full Access Guaranteed
🔹 Remote Access Tools – Control Any System
🔹 DDoS Attacks – Take Down Any Target Instantly
🔹 Crypto & Financial Hacks – Anonymous Transactions
🔹 Custom Malware & Exploits – Tailored for Your Needs
💼 Why Us?
✅ No Logs, No Traces, 100% Secure
✅ Anonymous Payment – Crypto Only
✅ Fast & Efficient – Results in Hours
📩 Contact Us on Encrypted Chat Only
