Supply Chain Attacks and Critical Infrastructure: How CISA Helps Secure a Nation’s Crown Jewels

06/04/2023 0 Comments 0 tags

Critical infrastructure attacks are a preferred target for cyber criminals. Here’s why and what’s being done to protect them. What is Critical Infrastructure and Why is It Attacked? Critical infrastructure

FBI Cracks Down on Genesis Market: 119 Arrested in Cybercrime Crackdown

06/04/2023 0 Comments 0 tags

A coordinated international law enforcement operation has dismantled Genesis Market, an illegal online marketplace that specialized in the sale of stolen credentials associated with email, bank accounts, and social media

Google Mandates Android Apps to Offer Easy Account Deletion In-App and Online

06/04/2023 0 Comments 0 tags

Google is enacting a new data deletion policy for Android apps that allow account creation to also offer users with a setting to delete their accounts in an attempt to

CryptoClippy: New Clipper Malware Targeting Portuguese Cryptocurrency Users

05/04/2023 0 Comments 0 tags

Portuguese users are being targeted by a new malware codenamed CryptoClippy that’s capable of stealing cryptocurrency as part of a malvertising campaign. The activity leverages SEO poisoning techniques to entice users searching

Hackers Using Self-Extracting Archives Exploit for Stealthy Backdoor Attacks

05/04/2023 0 Comments 0 tags

An unknown threat actor used a malicious self-extracting archive (SFX) file in an attempt to establish persistent backdoor access to a victim’s environment, new findings from CrowdStrike show. SFX files

Google TAG Warns of North Korean-linked ARCHIPELAGO Cyberattacks

05/04/2023 0 Comments 0 tags

A North Korean government-backed threat actor has been linked to attacks targeting government and military personnel, think tanks, policy makers, academics, and researchers in South Korea and the U.S. Google’s

Protect Your Company: Ransomware Prevention Made Easy

05/04/2023 0 Comments 0 tags

Every year hundreds of millions of malware attacks occur worldwide, and every year businesses deal with the impact of viruses, worms, keyloggers, and ransomware. Malware is a pernicious threat and

Typhon Reborn Stealer Malware Resurfaces with Advanced Evasion Techniques

05/04/2023 0 Comments 0 tags

The threat actor behind the information-stealing malware known as Typhon Reborn has resurfaced with an updated version (V2) that packs in improved capabilities to evade detection and resist analysis. The new version

New Rilide Malware Targeting Chromium-Based Browsers to Steal Cryptocurrency

04/04/2023 0 Comments 0 tags

Chromium-based web browsers are the target of a new malware called Rilide that masquerades itself as a seemingly legitimate extension to harvest sensitive data and siphon cryptocurrency. “Rilide malware is

Sorting Through Haystacks to Find CTI Needles

04/04/2023 0 Comments 0 tags

Clouded vision CTI systems are confronted with some major issues ranging from the size of the collection networks to their diversity, which ultimately influence the degree of confidence they can