Fake Recruiters Distribute Banking Trojan via Malicious Apps in Phishing Scam

10/12/2024 0 Comments 0 tags

Cybersecurity researchers have shed light on a sophisticated mobile phishing (aka mishing) campaign that’s designed to distribute an updated version of the Antidot banking trojan. “The attackers presented themselves as

Hackers Weaponize Visual Studio Code Remote Tunnels for Cyber Espionage

10/12/2024 0 Comments 0 tags

A suspected China-nexus cyber espionage group has been attributed to an attacks targeting large business-to-business IT service providers in Southern Europe as part of a campaign codenamed Operation Digital Eye.

Phone Phishing Gang Busted: Eight Arrested in Belgium and Netherlands

10/12/2024 0 Comments 0 tags

Belgian and Dutch authorities have arrested eight suspects in connection with a “phone phishing” gang that primarily operated out of the Netherlands with an aim to steal victims’ financial data

The Future of Network Security: Automated Internal and External Pentesting

10/12/2024 0 Comments 0 tags

In today’s rapidly evolving threat landscape, safeguarding your organization against cyberattacks is more critical than ever. Traditional penetration testing (pentesting), while effective, often falls short due to its high costs,

CERT-UA Warns of Phishing Attacks Targeting Ukraine’s Defense and Security Force

10/12/2024 0 Comments 0 tags

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new set of cyber attacks that it said were aimed at defense companies in the country as well

Ongoing Phishing and Malware Campaigns in December 2024

10/12/2024 0 Comments 0 tags

Cyber attackers never stop inventing new ways to compromise their targets. That’s why organizations must stay updated on the latest threats.  Here’s a quick rundown of the current malware and

Black Basta Ransomware Evolves with Email Bombing, QR Codes, and Social Engineering

09/12/2024 0 Comments 0 tags

The threat actors linked to the Black Basta ransomware have been observed switching up their social engineering tactics, distributing a different set of payloads such as Zbot and DarkGate since

Socks5Systemz Botnet Powers Illegal Proxy Service with 85,000+ Hacked Devices

09/12/2024 0 Comments 0 tags

A malicious botnet called Socks5Systemz is powering a proxy service called PROXY.AM, according to new findings from Bitsight. “Proxy malware and services enable other types of criminal activity adding uncontrolled

Seven Bolt-Ons to Make Your Entra ID More Secure for Critical Sessions

09/12/2024 0 Comments 0 tags

Identity security is all the rage right now, and rightfully so. Securing identities that access an organization’s resources is a sound security model. But IDs have their limits, and there

Researchers Uncover Prompt Injection Vulnerabilities in DeepSeek and Claude AI

09/12/2024 0 Comments 0 tags

Details have emerged about a now-patched security flaw in the DeepSeek artificial intelligence (AI) chatbot that, if successfully exploited, could permit a bad actor to take control of a victim’s