Cyber Threat Intelligence: Illuminating the Deep, Dark Cybercriminal Underground

30/07/2024 0 Comments 0 tags

Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. Each story shines a light on underground activities, the threat actors

The Power and Peril of RMM Tools

30/07/2024 0 Comments 0 tags

As more people work remotely, IT departments must manage devices distributed over different cities and countries relying on VPNs and remote monitoring and management (RMM) tools for system administration.  However,

New Mandrake Spyware Found in Google Play Store Apps After Two Years

30/07/2024 0 Comments 0 tags

A new iteration of a sophisticated Android spyware called Mandrake has been discovered in five applications that were available for download from the Google Play Store and remained undetected for

New SideWinder Cyber Attacks Target Maritime Facilities in Multiple Countries

30/07/2024 0 Comments 0 tags

The nation-state threat actor known as SideWinder has been attributed to a new cyber espionage campaign targeting ports and maritime facilities in the Indian Ocean and Mediterranean Sea. The BlackBerry

OneDrive Phishing Scam Tricks Users into Running Malicious PowerShell Script

30/07/2024 0 Comments 0 tags

Cybersecurity researchers are warning about a new phishing campaign that targets Microsoft OneDrive users with the aim of executing a malicious PowerShell script. “This campaign heavily relies on social engineering

VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access

30/07/2024 0 Comments 0 tags

A recently patched security flaw impacting VMware ESXi hypervisors has been actively exploited by “several” ransomware groups to gain elevated permissions and deploy file-encrypting malware. The attacks involve the exploitation

Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild

30/07/2024 0 Comments 0 tags

Cybersecurity company Acronis is warning that a now-patched critical security flaw impacting its Cyber Infrastructure (ACI) product has been exploited in the wild. The vulnerability, tracked as CVE-2023-45249 (CVSS score:

Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails

29/07/2024 0 Comments 0 tags

An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email security vendor Proofpoint’s defenses to send millions of messages spoofing

How Searchable Encryption Changes the Data Security Game

29/07/2024 0 Comments 0 tags

Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals everywhere. Organizations know they must encrypt their most valuable, sensitive data to prevent data theft

‘Stargazer Goblin’ Creates 3,000 Fake GitHub Accounts for Malware Spread

29/07/2024 0 Comments 0 tags

A threat actor known as Stargazer Goblin has set up a network of inauthentic GitHub accounts to fuel a Distribution-as-a-Service (DaaS) that propagates a variety of information-stealing malware and netting