Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting
3 min read
admin
January 16, 2025
The Russian threat actor known as Star Blizzard has been linked to a new spear-phishing campaign that...
admin
January 16, 2025
You can tell the story of the current state of stolen credential-based attacks in three numbers:
Stolen credentials...
admin
January 16, 2025
Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot...
admin
January 16, 2025
Cybersecurity researchers have found that the Microsoft Active Directory Group Policy that's designed to disable NT LAN...
admin
January 16, 2025
Threat actors have been observed concealing malicious code in images to deliver malware such as VIP Keylogger...
admin
January 16, 2025
The digital world is exploding. IoT devices are multiplying like rabbits, certificates are piling up faster than...
admin
January 16, 2025
Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Python-based backdoor to maintain...
admin
January 16, 2025
Ivanti has rolled out security updates to address several security flaws impacting Avalanche, Application Control Engine, and...
admin
January 15, 2025
Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with...
admin
January 15, 2025
Cybersecurity researchers have alerted to a new malvertising campaign that's targeting individuals and businesses advertising via Google...
admin
January 15, 2025
The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99...
admin
January 15, 2025
Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker...
admin
January 15, 2025
As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix...
admin
January 15, 2025
The U.S. Department of Justice (DoJ) on Tuesday disclosed that a court-authorized operation allowed the Federal Bureau...
admin
January 15, 2025
Microsoft kicked off 2025 with a new set of patches for a total of 161 security vulnerabilities...
admin
January 15, 2025
Cybersecurity researchers have disclosed multiple security flaws in SimpleHelp remote access software that could lead to information...
admin
January 14, 2025
Microsoft has shed light on a now-patched security flaw impacting Apple macOS that, if successfully exploited, could...
admin
January 14, 2025
New research has pulled back the curtain on a "deficiency" in Google's "Sign in with Google" authentication...
admin
January 14, 2025
What do identity risks, data security risks and third-party risks all have in common? They are all...
admin
January 14, 2025
The Telegram-based online marketplace known as HuiOne Guarantee and its vendors have cumulatively received at least $24...