Magento Sites Targeted with Sneaky Credit Card Skimmer via Swap Files

23/07/2024 0 Comments 0 tags

Threat actors have been observed using swap files in compromised websites to conceal a persistent credit card skimmer and harvest payment information. The sneaky technique, observed by Sucuri on a

How to Securely Onboard New Employees Without Sharing Temporary Passwords

23/07/2024 0 Comments 0 tags

The initial onboarding stage is a crucial step for both employees and employers. However, this process often involves the practice of sharing temporary first-day passwords, which can expose organizations to

Google Abandons Plan to Phase Out Third-Party Cookies in Chrome

23/07/2024 0 Comments 0 tags

Google on Monday abandoned plans to phase out third-party tracking cookies in its Chrome web browser more than four years after it introduced the option as part of a larger

Experts Uncover Chinese Cybercrime Network Behind Gambling and Human Trafficking

22/07/2024 0 Comments 0 tags

The relationship between various TDSs and DNS associated with Vigorish Viper and the final landing experience for the user A Chinese organized crime syndicate with links to money laundering and

PINEAPPLE and FLUXROOT Hacker Groups Abuse Google Cloud for Credential Phishing

22/07/2024 0 Comments 0 tags

A Latin America (LATAM)-based financially motivated actor codenamed FLUXROOT has been observed leveraging Google Cloud serverless projects to orchestrate credential phishing activity, highlighting the abuse of the cloud computing model

SocGholish Malware Exploits BOINC Project for Covert Cyberattacks

22/07/2024 0 Comments 0 tags

The JavaScript downloader malware known as SocGholish (aka FakeUpdates) is being used to deliver a remote access trojan called AsyncRAT as well as a legitimate open-source project called BOINC. BOINC,

MSPs & MSSPs: How to Increase Engagement with Your Cybersecurity Clients Through vCISO Reporting

22/07/2024 0 Comments 0 tags

As a vCISO, you are responsible for your client’s cybersecurity strategy and risk governance. This incorporates multiple disciplines, from research to execution to reporting. Recently, we published a comprehensive playbook

How to Set up an Automated SMS Analysis Service with AI in Tines

22/07/2024 0 Comments 0 tags

The opportunities to use AI in workflow automation are many and varied, but one of the simplest ways to use AI to save time and enhance your organization’s security posture

New Linux Variant of Play Ransomware Targeting VMWare ESXi Systems

22/07/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a new Linux variant of a ransomware strain known as Play (aka Balloonfly and PlayCrypt) that’s designed to target VMWare ESXi environments. “This development suggests that

Cybercriminals Exploit CrowdStrike Update Mishap to Distribute Remcos RAT Malware

20/07/2024 0 Comments 0 tags

Cybersecurity firm CrowdStrike, which is facing the heat for causing worldwide IT disruptions by pushing out a flawed update to Windows devices, is now warning that threat actors are exploiting