Cybercriminals Using Telekopye Telegram Bot to Craft Phishing Scams on a Grand Scale

25/11/2023 0 Comments 0 tags

More details have emerged about a malicious Telegram bot called Telekopye that’s used by threat actors to pull off large-scale phishing scams. “Telekopye can craft phishing websites, emails, SMS messages, and more,”

Tell Me Your Secrets Without Telling Me Your Secrets

25/11/2023 0 Comments 0 tags

The title of this article probably sounds like the caption to a meme. Instead, this is an actual problem GitGuardian’s engineers had to solve in implementing the mechanisms for their

Mirai-based Botnet Exploiting Zero-Day Bugs in Routers and NVRs for Massive DDoS Attacks

23/11/2023 0 Comments 0 tags

An active malware campaign is leveraging two zero-day vulnerabilities with remote code execution (RCE) functionality to rope routers and video recorders into a Mirai-based distributed denial-of-service (DDoS) botnet. “The payload

N. Korean Hackers Distribute Trojanized CyberLink Software in Supply Chain Attack

23/11/2023 0 Comments 0 tags

A North Korean state-sponsored threat actor tracked as Diamond Sleet is distributing a trojanized version of a legitimate application developed by a Taiwanese multimedia software developer called CyberLink to target downstream customers

6 Steps to Accelerate Cybersecurity Incident Response

23/11/2023 0 Comments 0 tags

Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad actors still occasionally find a way in. Security teams must

New Flaws in Fingerprint Sensors Let Attackers Bypass Windows Hello Login

23/11/2023 0 Comments 0 tags

A new research has uncovered multiple vulnerabilities that could be exploited to bypass Windows Hello authentication on Dell Inspiron 15, Lenovo ThinkPad T14, and Microsoft Surface Pro X laptops. The flaws were

North Korean Hackers Pose as Job Recruiters and Seekers in Malware Campaigns

22/11/2023 0 Comments 0 tags

North Korean threat actors have been linked to two campaigns in which they masquerade as both job recruiters and seekers to distribute malware and obtain unauthorized employment with organizations based

AI Solutions Are the New Shadow IT

22/11/2023 0 Comments 0 tags

Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security RisksLike the SaaS shadow IT of the past, AI is placing CISOs and cybersecurity teams in a tough but familiar spot.  Employees

ClearFake Campaign Expands to Target Mac Systems with Atomic Stealer

22/11/2023 0 Comments 0 tags

The macOS information stealer known as Atomic is now being delivered to target via a bogus web browser update chain tracked as ClearFake. “This may very well be the first

LockBit Ransomware Exploiting Critical Citrix Bleed Vulnerability to Break In

22/11/2023 0 Comments 0 tags

Multiple threat actors, including LockBit ransomware affiliates, are actively exploiting a recently disclosed critical security flaw in Citrix NetScaler application delivery control (ADC) and Gateway appliances to obtain initial access to target