Sunday, July 14, 2024

Weaponized Free Download Manager for Linux Steals System Data & Passwords 

0
In recent years, Linux systems gained prominence among diverse threat actors, with more than 260,000 unique samples emerging in H1 2023.In the case of...

Chinese Redfly Hacked National Power Grid & Maintained Access for 6 Months

0
Cybersecurity researchers at Symantec's Threat Hunter Team recently discovered that the Redfly threat actor group used ShadowPad Trojan to breach an Asian national grid...

New Sponsor Malware Attacking Government & Healthcare Organizations

0
The Ballistic Bobcat is an Iran-aligned APT group, and initially, about two years ago, cybersecurity researchers at ESET tracked this threat group. Here below,...

Chinese Hack of Microsoft Consumer Key Stemmed From its Engineer’s Corporate Account

0
Storm-0558, a threat actor based in China, has recently gained access to a Microsoft account consumer key. This has allowed them to infiltrate and...

Russian APT28 Hacking Group Attacking Critical Power Infrastructure

0
The АРТ28 hacking group, suspected to have ties to Russian special services, has made an audacious attempt to breach the critical power infrastructure of...

Threat Actors Abuse Google Groups to Send Fake order Notifications

0
Threat actors continue to evolve their spam tactics by utilizing legitimate  Google Groups to send Fake order messages to target multiple users. Fake order scams...

How Does Cryptocurrency Affect Cybersecurity?

0
Lately, cryptocurrencies have emerged as a notable cybersecurity threat. Unsuspecting users are being scammed or hacked more than ever.Most troubles start because people don’t...

Multi-Factor Authentication: The Threat of Adversary-in-the-Middle Attacks

0
Data breaches continue to plague organizations, with the majority originating from the theft of user credentials through phishing and smishing attacks. The results of...

How To Respond Cyber Incident In your Organization

2
An incident response plan is very essential for any organization to respond to an incident as quickly as possible. Here we have overviewed how...

Transcription Security Essentials: How to Protect Your Data in the Digital Age

0
In the digital age, protecting your data is more important than ever. With hackers becoming increasingly sophisticated in their methods of stealing sensitive information,...

Managed WAF protection

Website

Recent Articles