THREATS

Meta Unveils 8 Spyware Companies Targeting iOS, Android, & Windows DevicesMeta Unveils 8 Spyware Companies Targeting iOS, Android, & Windows Devices

Meta Unveils 8 Spyware Companies Targeting iOS, Android, & Windows Devices

Spyware firms target iOS, Android, and Windows devices due to their widespread usage, making them lucrative targets for gathering sensitive…

1 year ago
Hackers Abusing LSASS Process Memory to Exfiltrate Login CredentialsHackers Abusing LSASS Process Memory to Exfiltrate Login Credentials

Hackers Abusing LSASS Process Memory to Exfiltrate Login Credentials

Threat actors have been using several methods for credential stealing, which varies based on the environment and infrastructure of the…

1 year ago
Sidewinder Hacker Group Using Weaponized Documents to Deliver MalwareSidewinder Hacker Group Using Weaponized Documents to Deliver Malware

Sidewinder Hacker Group Using Weaponized Documents to Deliver Malware

Sidewinder APT group's sophisticated threat landscape reveals a skilled and persistent threat targeting the Nepalese Government entities.  Their focus extends…

1 year ago
Tech Device Manufacturers Urged by CISA to Remove Default PasswordsTech Device Manufacturers Urged by CISA to Remove Default Passwords

Tech Device Manufacturers Urged by CISA to Remove Default Passwords

Recently, the Cybersecurity and Infrastructure Security Agency (CISA) has requested technology device manufacturers to take measures to eliminate default passwords…

1 year ago
Over 50% of the Insider Attacks Uses Privilege Escalation VulnerabilityOver 50% of the Insider Attacks Uses Privilege Escalation Vulnerability

Over 50% of the Insider Attacks Uses Privilege Escalation Vulnerability

In the labyrinth of cybersecurity, the specter of insider threats emerges as a formidable adversary, wielding both malicious intent and…

1 year ago
North Korean Hackers Posed as Job Recruiters and SeekersNorth Korean Hackers Posed as Job Recruiters and Seekers

North Korean Hackers Posed as Job Recruiters and Seekers

Two ongoing efforts, Contagious Interview and Wagemole, have been identified to target job-seeking activities connected to North Korean Hackers and…

1 year ago
Chinese APT Infrastructure Mimics Cloud Backup ServicesChinese APT Infrastructure Mimics Cloud Backup Services

Chinese APT Infrastructure Mimics Cloud Backup Services

Cambodian government entities were discovered to be targeted and compromised by Chinese APT actors. The threat actors are using the…

1 year ago
Microsoft Authenticator New Feature Blocks Malicious Notification by DefaultMicrosoft Authenticator New Feature Blocks Malicious Notification by Default

Microsoft Authenticator New Feature Blocks Malicious Notification by Default

In an age where online threats loom large, safeguarding our personal and professional accounts has never been more critical.  With…

1 year ago
DarkGate, Which Abused Microsoft Teams, Now Leverages MSI FilesDarkGate, Which Abused Microsoft Teams, Now Leverages MSI Files

DarkGate, Which Abused Microsoft Teams, Now Leverages MSI Files

A new wave of cyberattacks has been discovered by Netskope Threat Labs, involving the use of SharePoint as a delivery…

1 year ago
Octo Tempest Attacking Organizations to Steal Financial DataOcto Tempest Attacking Organizations to Steal Financial Data

Octo Tempest Attacking Organizations to Steal Financial Data

Microsoft has been closely monitoring the Octo Tempest, a significant financial threat organization.  This threat group employs various strategies and…

1 year ago