BreachForums Returns Just Weeks After FBI Seizure – Honeypot or Blunder?

29/05/2024 0 Comments 0 tags

The online criminal bazaar BreachForums has been resurrected merely two weeks after a U.S.-led coordinated law enforcement action dismantled and seized control of its infrastructure. Cybersecurity researchers and dark web

Indian National Pleads Guilty to $37 Million Cryptocurrency Theft Scheme

28/05/2024 0 Comments 0 tags

An Indian national has pleaded guilty in the U.S. over charges of stealing more than $37 million by setting up a website that impersonated the Coinbase cryptocurrency exchange platform. Chirag

4-Step Approach to Mapping and Securing Your Organization’s Most Critical Assets

28/05/2024 0 Comments 0 tags

You’re probably familiar with the term “critical assets”. These are the technology assets within your company’s IT infrastructure that are essential to the functioning of your organization. If anything happens

Researchers Warn of CatDDoS Botnet and DNSBomb DDoS Attack Technique

28/05/2024 0 Comments 0 tags

The threat actors behind the CatDDoS malware botnet have exploited over 80 known security flaws in various software over the past three months to infiltrate vulnerable devices and co-opt them

TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks

28/05/2024 0 Comments 0 tags

A maximum-severity security flaw has been disclosed in the TP-Link Archer C5400X gaming router that could lead to remote code execution on susceptible devices by sending specially crafted requests. The vulnerability, tracked

WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites

28/05/2024 0 Comments 0 tags

Unknown threat actors are abusing lesser-known code snippet plugins for WordPress to insert malicious PHP code in victim sites that are capable of harvesting credit card data. The campaign, observed by Sucuri

Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud

27/05/2024 0 Comments 0 tags

Microsoft is calling attention to a Morocco-based cybercrime group dubbed Storm-0539 that’s behind gift card fraud and theft through highly sophisticated email and SMS phishing attacks. “Their primary motivation is to steal

New Tricks in the Phishing Playbook: Cloudflare Workers, HTML Smuggling, GenAI

27/05/2024 0 Comments 0 tags

Cybersecurity researchers are alerting of phishing campaigns that abuse Cloudflare Workers to serve phishing sites that are used to harvest users’ credentials associated with Microsoft, Gmail, Yahoo!, and cPanel Webmail. The attack method, called

Report: The Dark Side of Phishing Protection

27/05/2024 0 Comments 0 tags

The transition to the cloud, poor password hygiene and the evolution in webpage technologies have all enabled the rise in phishing attacks. But despite sincere efforts by security stakeholders to mitigate them

Pakistan-linked Hackers Deploy Python, Golang, and Rust Malware on Indian Targets

27/05/2024 0 Comments 0 tags

The Pakistan-nexus Transparent Tribe actor has been linked to a new set of attacks targeting Indian government, defense, and aerospace sectors using cross-platform malware written in Python, Golang, and Rust. “This cluster