Malicious actors are increasingly using public services like GitHub to host malware, enabling them to bypass detection tools. Threat research team ReversingLabs identified two novel techniques being used on GitHub. The first exploits GitHub Gists to host two-stage malicious payloads, while the second issues commands through git commit messages. Using GitHub for command and control (C2) infrastructure allows attackers to communicate with infected computers without arousing suspicion.

Week in review: High-severity LPE vulnerability in the Linux kernel, cPanel 0-day exploited for months
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The AI criminal mastermind is already hiring on gig platforms

