Randstorm Exploit: Bitcoin Wallets Created b/w 2011-2015 Vulnerable to Hacking

20/11/2023 0 Comments 0 tags

Bitcoin wallets created between 2011 and 2015 are susceptible to a new kind of exploit called Randstorm that makes it possible to recover passwords and gain unauthorized access to a multitude of

LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique

20/11/2023 0 Comments 0 tags

The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique that leverages the mathematical principle of trigonometry to evade detection and exfiltrate valuable information from infected hosts.

Why Defenders Should Embrace a Hacker Mindset

20/11/2023 0 Comments 0 tags

Today’s security leaders must manage a constantly evolving attack surface and a dynamic threat environment due to interconnected devices, cloud services, IoT technologies, and hybrid work environments. Adversaries are constantly

Product Walkthrough: Silverfort’s Unified Identity Protection Platform

20/11/2023 0 Comments 0 tags

In this article, we will provide a brief overview of Silverfort’s platform, the first (and currently only) unified identity protection platform on the market. Silverfort’s patented technology aims to protect

DarkGate and PikaBot Malware Resurrect QakBot’s Tactics in New Phishing Attacks

20/11/2023 0 Comments 0 tags

Phishing campaigns delivering malware families such as DarkGate and PikaBot are following the same tactics previously used in attacks leveraging the now-defunct QakBot trojan. “These include hijacked email threads as

NetSupport RAT Infections on the Rise – Targeting Government and Business Sectors

20/11/2023 0 Comments 0 tags

Threat actors are targeting the education, government and business services sectors with a remote access trojan called NetSupport RAT. “The delivery mechanisms for the NetSupport RAT encompass fraudulent updates, drive-by downloads,

8Base Group Deploying New Phobos Ransomware Variant via SmokeLoader

18/11/2023 0 Comments 0 tags

The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated attacks. The findings come from Cisco Talos, which has recorded an increase

Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks

18/11/2023 0 Comments 0 tags

Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been observed using a USB propagating worm called LitterDrifter in attacks targeting Ukrainian entities. Check Point, which detailed Gamaredon’s (aka Aqua Blizzard,

FCC Enforces Stronger Rules to Protect Customers Against SIM Swapping Attacks

17/11/2023 0 Comments 0 tags

The U.S. Federal Communications Commission (FCC) is adopting new rules that aim to protect consumers from cell phone account scams that make it possible for malicious actors to orchestrate SIM-swapping

Beware: Malicious Google Ads Trick WinSCP Users into Installing Malware

17/11/2023 0 Comments 0 tags

Threat actors are leveraging manipulated search results and bogus Google ads that trick users who are looking to download legitimate software such as WinSCP into installing malware instead. Cybersecurity company