In an era defined by digital connectivity, where online communication reigns supreme, the realm of cybersecurity threats has evolved into a landscape of unprecedented sophistication. Amidst this evolving threat landscape, the Man-in-the-Middle (MitM) attack emerges as...
Phishing
Cybercriminals Exploit EV Certificates in Phishing Campaigns to Spread Ransomware
In recent developments, threat actors responsible for the RedLine and Vidar information stealers have exhibited a notable shift towards ransomware operations. This transition has been primarily facilitated through phishing campaigns, deploying initial payloads that...
This Week in Cybersecurity: Sep 11 – Sep 15
ALPHV Brings MGM Resorts to a Halt in Ten Minutes In a recent cyber incident that has shaken the operations of MGM Resorts, the ALPHV/BlackCat ransomware group has emerged as the main culprit. This unanticipated breach originated from an unusual source, LinkedIn,...
New Phishing Campaign Targets Corporations Through Microsoft Teams Messages
Microsoft has issued a warning regarding a new phishing campaign orchestrated by an initial access broker, which involves exploiting Microsoft Teams messages as bait to breach corporate networks. This campaign, dubbed Storm-0324 (also known as TA543 and Sagrid), marks...
This Week in Cybersecurity: Sep 04 – Sep 08
Critical Vulnerabilities Discovered in SEL’s Power Management Products In a recent disclosure, Schweitzer Engineering Laboratories (SEL) finds itself in the spotlight, as Nozomi Networks uncovers nine security vulnerabilities within their electric power management...
Malvertising Campaign Distributes Atomic Stealer Malware to macOS Users
A fresh malvertising campaign has emerged, shedding light on the ongoing maintenance and distribution of the macOS stealer malware known as Atomic Stealer, or AMOS. This stealthy malware, available for a monthly subscription of $1,000, first surfaced in April 2023....
Unseen Threats: Demystifying Fileless Malware Attacks
In today's digital landscape, cybersecurity is a critical concern for organizations of all sizes. Malicious actors are constantly evolving their tactics to bypass traditional security measures. One such technique that has gained significant traction is deploying...
Phishing Attacks Introduce Fresh SideTwist Backdoor and Agent Tesla Variant
APT34, the Iranian threat actor known by various aliases such as Cobalt Gypsy, Hazel Sandstorm, Helix Kitten, and OilRig, has surfaced in connection with a fresh phishing campaign. This campaign takes an intricate route, culminating in the deployment of a SideTwist...
Smishing Triad Launches Large-Scale iMessage Smishing Campaign in U.S.
Chinese-speaking cybercriminals have launched a iMessage smishing (SMS phishing) campaign in the United States. This campaign involves sending iMessages from compromised Apple iCloud accounts, for identity theft and financial fraud. The orchestrators of this campaign,...
This Week in CyberSecurity: Aug 28 – Sep 01
Android Trojan MMRat Exploits Accessibility Feature for Remote Financial Fraud The Android banking trojan known as MMRat has emerged as a significant threat, primarily targeting users in Southeast Asia since late June 2023. This trojan, operating inconspicuously under...
Stay Up to Date With The Latest News & Updates
Join Our Newsletter
Follow Us