Researchers Uncover Thriving Phishing Kit Market on Telegram Channels

07/04/2023 0 Comments 0 tags

In yet another sign that Telegram is increasingly becoming a thriving hub for cybercrime, researchers have found that threat actors are using the messaging platform to peddle phishing kits and help set

Microsoft Takes Legal Action to Disrupt Cybercriminals’ Illegal Use of Cobalt Strike Tool

07/04/2023 0 Comments 0 tags

Microsoft said it teamed up with Fortra and Health Information Sharing and Analysis Center (Health-ISAC) to tackle the abuse of Cobalt Strike by cybercriminals to distribute malware, including ransomware. To

Are Source Code Leaks the New Threat Software vendors Should Care About?

07/04/2023 0 Comments 0 tags

Less than a month ago, Twitter indirectly acknowledged that some of its source code had been leaked on the code-sharing platform GitHub by sending a copyright infringement notice to take

CISA Warns of Critical ICS Flaws in Hitachi, mySCADA, ICL, and Nexx Products

07/04/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published eight Industrial Control Systems (ICS) advisories warning of critical flaws affecting products from Hitachi Energy, mySCADA Technologies, Industrial Control Links, and Nexx. Topping

Supply Chain Attacks and Critical Infrastructure: How CISA Helps Secure a Nation’s Crown Jewels

06/04/2023 0 Comments 0 tags

Critical infrastructure attacks are a preferred target for cyber criminals. Here’s why and what’s being done to protect them. What is Critical Infrastructure and Why is It Attacked? Critical infrastructure

FBI Cracks Down on Genesis Market: 119 Arrested in Cybercrime Crackdown

06/04/2023 0 Comments 0 tags

A coordinated international law enforcement operation has dismantled Genesis Market, an illegal online marketplace that specialized in the sale of stolen credentials associated with email, bank accounts, and social media

Google Mandates Android Apps to Offer Easy Account Deletion In-App and Online

06/04/2023 0 Comments 0 tags

Google is enacting a new data deletion policy for Android apps that allow account creation to also offer users with a setting to delete their accounts in an attempt to

CryptoClippy: New Clipper Malware Targeting Portuguese Cryptocurrency Users

05/04/2023 0 Comments 0 tags

Portuguese users are being targeted by a new malware codenamed CryptoClippy that’s capable of stealing cryptocurrency as part of a malvertising campaign. The activity leverages SEO poisoning techniques to entice users searching

Hackers Using Self-Extracting Archives Exploit for Stealthy Backdoor Attacks

05/04/2023 0 Comments 0 tags

An unknown threat actor used a malicious self-extracting archive (SFX) file in an attempt to establish persistent backdoor access to a victim’s environment, new findings from CrowdStrike show. SFX files

Google TAG Warns of North Korean-linked ARCHIPELAGO Cyberattacks

05/04/2023 0 Comments 0 tags

A North Korean government-backed threat actor has been linked to attacks targeting government and military personnel, think tanks, policy makers, academics, and researchers in South Korea and the U.S. Google’s