DOJ Slams XCast with $10 Million Fine Over Massive Illegal Robocall Operation

03/01/2024 0 Comments 0 tags

The U.S. Department of Justice (DoJ) on Tuesday said it reached a settlement with VoIP service provider XCast over allegations that it facilitated illegal telemarketing campaigns since at least January

SMTP Smuggling: New Flaw Lets Attackers Bypass Security and Spoof Emails

03/01/2024 0 Comments 0 tags

A new exploitation technique called Simple Mail Transfer Protocol (SMTP) smuggling can be weaponized by threat actors to send spoofed emails with fake sender addresses while bypassing security measures. “Threat

5 Ways to Reduce SaaS Security Risks

03/01/2024 0 Comments 0 tags

As technology adoption has shifted to be employee-led, just in time, and from any location or device, IT and security teams have found themselves contending with an ever-sprawling SaaS attack

Malware Using Google MultiLogin Exploit to Maintain Access Despite Password Reset

03/01/2024 0 Comments 0 tags

Information stealing malware are actively taking advantage of an undocumented Google OAuth endpoint named MultiLogin to hijack user sessions and allow continuous access to Google services even after a password

Google Settles $5 Billion Privacy Lawsuit Over Tracking Users in ‘Incognito Mode’

02/01/2024 0 Comments 0 tags

Google has agreed to settle a lawsuit filed in June 2020 that alleged that the company misled users by tracking their surfing activity who thought that their internet use remained private when

The Definitive Enterprise Browser Buyer’s Guide

02/01/2024 0 Comments 0 tags

Security stakeholders have come to realize that the prominent role the browser has in the modern corporate environment requires a re-evaluation of how it is managed and protected. While not

New Variant of DLL Search Order Hijacking Bypasses Windows 10 and 11 Protections

01/01/2024 0 Comments 0 tags

Security researchers have detailed a new variant of a dynamic link library (DLL) search order hijacking technique that could be used by threat actors to bypass security mechanisms and achieve

New Terrapin Flaw Could Let Attackers Downgrade SSH Protocol Security

01/01/2024 0 Comments 0 tags

Security researchers from Ruhr University Bochum have discovered a vulnerability in the Secure Shell (SSH) cryptographic network protocol that could allow an attacker to downgrade the connection’s security by breaking

New JinxLoader Targeting Users with Formbook and XLoader Malware

01/01/2024 0 Comments 0 tags

A new Go-based malware loader called JinxLoader is being used by threat actors to deliver next-stage payloads such as Formbook and its successor XLoader. The disclosure comes from cybersecurity firms Palo Alto Networks Unit 42

Beware: Scam-as-a-Service Aiding Cybercriminals in Crypto Wallet-Draining Attacks

30/12/2023 0 Comments 0 tags

Cybersecurity researchers are warning about an increase in phishing attacks that are capable of draining cryptocurrency wallets. “These threats are unique in their approach, targeting a wide range of blockchain