PEACHPIT: Massive Ad Fraud Botnet Powered by Millions of Hacked Android and iOS

11/10/2023 0 Comments 0 tags

An ad fraud botnet dubbed PEACHPIT leveraged an army of hundreds of thousands of Android and iOS devices to generate illicit profits for the threat actors behind the scheme. The botnet is

Cybercriminals Using EvilProxy Phishing Kit to Target Senior Executives in U.S. Firms

11/10/2023 0 Comments 0 tags

Senior executives working in U.S.-based organizations are being targeted by a new phishing campaign that leverages a popular adversary-in-the-middle (AiTM) phishing toolkit named EvilProxy to conduct credential harvesting and account takeover attacks.

Webinar: How vCISOs Can Navigating the Complex World of AI and LLM Security

11/10/2023 0 Comments 0 tags

In today’s rapidly evolving technological landscape, the integration of Artificial Intelligence (AI) and Large Language Models (LLMs) has become ubiquitous across various industries. This wave of innovation promises improved efficiency

Gaza-Linked Cyber Threat Actor Targets Israeli Energy and Defense Sectors

09/10/2023 0 Comments 0 tags

A Gaza-based threat actor has been linked to a series of cyber attacks aimed at Israeli private-sector energy, defense, and telecommunications organizations. Microsoft, which revealed details of the activity in

North Korea’s Lazarus Group Launders $900 Million in Cryptocurrency

06/10/2023 0 Comments 0 tags

As much as $7 billion in cryptocurrency has been illicitly laundered through cross-chain crime, with the North Korea-linked Lazarus Group linked to the theft of roughly $900 million of those

New OS Tool Tells You Who Has Access to What Data

06/10/2023 0 Comments 0 tags

Ensuring sensitive data remains confidential, protected from unauthorized access, and compliant with data privacy regulations is paramount. Data breaches result in financial and reputational damage but also lead to legal

GitHub’s Secret Scanning Feature Now Covers AWS, Microsoft, Google, and Slack

06/10/2023 0 Comments 0 tags

GitHub has announced an improvement to its secret scanning feature that extends validity checks to popular services such as Amazon Web Services (AWS), Microsoft, Google, and Slack. Validity checks, introduced by the Microsoft subsidiary

Supermicro’s BMC Firmware Found Vulnerable to Multiple Critical Vulnerabilities

06/10/2023 0 Comments 0 tags

Multiple security vulnerabilities have been disclosed in the Intelligent Platform Management Interface (IPMI) firmware for Supermicro baseboard management controllers (BMCs) that could result in privilege escalation and execution of malicious

Chinese Hackers Target Semiconductor Firms in East Asia with Cobalt Strike

06/10/2023 0 Comments 0 tags

Threat actors have been observed targeting semiconductor companies in East Asia with lures masquerading as Taiwan Semiconductor Manufacturing Company (TSMC) that are designed to deliver Cobalt Strike beacons. The intrusion

QakBot Threat Actors Still in Action, Using Ransom Knight and Remcos RAT in Latest Attacks

05/10/2023 0 Comments 0 tags

Despite the disruption to its infrastructure, the threat actors behind the QakBot malware have been linked to an ongoing phishing campaign since early August 2023 that led to the delivery