Skip to content
InfosecToday.com
  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
Microsoft 365’s Direct Send feature has been exploited to circumvent email security measures.
Email Security Exploitation | Social Engineering Techniques  | Spear Phishing

Microsoft 365’s Direct Send feature has been exploited to circumvent email security measures.

The ScarCruft hacker group has initiated a new malware campaign that utilizes Rust programming language and the PubNub service.
Cybersecurity Threats | Malware Development | Ransomware Evolution

The ScarCruft hacker group has initiated a new malware campaign that utilizes Rust programming language and the PubNub service.

Recent “Ghost Calls” attacks exploit web conferencing tools for secret command and control operations.
Command and Control Techniques  | Cybersecurity Threats | Web Conferencing Exploits

Recent “Ghost Calls” attacks exploit web conferencing tools for secret command and control operations.

A total of 6,500 Axis servers are found to have the Remoting Protocol open, with 4,000 of them located in the United States susceptible to potential exploits.
Cybersecurity Vulnerabilities  | Remote Code Execution | Video Surveillance Security 

A total of 6,500 Axis servers are found to have the Remoting Protocol open, with 4,000 of them located in the United States susceptible to potential exploits.

Malicious Go and npm packages are spreading cross-platform malware that can initiate remote data erasure.
Cross-Platform Vulnerabilities  | Malicious Software | Supply Chain Risks

Malicious Go and npm packages are spreading cross-platform malware that can initiate remote data erasure.

IRGC-affiliated hacking groups are launching attacks on specific financial institutions, government entities, and media organizations.
Critical Infrastructure Threats  | Cyber Warfare | State-Sponsored Cyberattacks

IRGC-affiliated hacking groups are launching attacks on specific financial institutions, government entities, and media organizations.

Advanced DevilsTongue Windows spyware monitors users around the world.
Cybersecurity Threats | Global Espionage  | Malware Techniques 

Advanced DevilsTongue Windows spyware monitors users around the world.

Weaknesses in Rockwell Arena Simulation allow attackers to run harmful code from a distance.
Cybersecurity Vulnerabilities  | Memory Corruption | Software Updates

Weaknesses in Rockwell Arena Simulation allow attackers to run harmful code from a distance.

CAPTCHAgeddon – A New ClickFix Attack Uses Phony CAPTCHA to Distribute Malware
Browser-Based Attacks | Cross-Platform Threats  | Malware Campaigns

CAPTCHAgeddon – A New ClickFix Attack Uses Phony CAPTCHA to Distribute Malware

Vulnerabilities in CyberArk Conjur have led to the exposure of sensitive enterprise information.
Cybersecurity | Remote Code Execution | Vulnerabilities

Vulnerabilities in CyberArk Conjur have led to the exposure of sensitive enterprise information.

SpyCloud Improves Its Investigations Solution by Incorporating AI-Driven Insights – Transforming the Analysis of Insider Threats and Cybercrime.
AI-Powered Investigations  | Cybersecurity | Identity Threat Protection

SpyCloud Improves Its Investigations Solution by Incorporating AI-Driven Insights – Transforming the Analysis of Insider Threats and Cybercrime.

Cybercriminals Employ Social Engineering Tactics to Secure Remote Access in 300 Seconds.
Credential Harvesting  | Remote Access Tools  | Social Engineering

Cybercriminals Employ Social Engineering Tactics to Secure Remote Access in 300 Seconds.

A newly discovered vulnerability in Microsoft Exchange Server allows attackers to acquire administrative privileges.
Cybersecurity Vulnerability | Microsoft Exchange Server | Privilege Escalation 

A newly discovered vulnerability in Microsoft Exchange Server allows attackers to acquire administrative privileges.

Leading enterprise AI assistants are susceptible to misuse, which could lead to data theft and manipulation.
AI Security Risks  | Data Theft | Prompt Manipulation

Leading enterprise AI assistants are susceptible to misuse, which could lead to data theft and manipulation.

Scientists have discovered a vulnerability in ECScape related to Amazon ECS that allows for the theft of credentials across different tasks.
Cloud Security | Cybersecurity Vulnerabilities  | Privilege Escalation Techniques 

Scientists have discovered a vulnerability in ECScape related to Amazon ECS that allows for the theft of credentials across different tasks.

Akira and Lynx ransomware are targeting Managed Service Providers (MSPs) by exploiting stolen login credentials and existing vulnerabilities.
Attack Techniques  | Ransomware Operations | Targeted Industries

Akira and Lynx ransomware are targeting Managed Service Providers (MSPs) by exploiting stolen login credentials and existing vulnerabilities.

Lazarus Hackers deceive users into thinking their camera or microphone is disabled in order to deploy the PyLangGhost RAT.
Cybersecurity Threats | Malware Distribution Techniques  | Social Engineering Tactics

Lazarus Hackers deceive users into thinking their camera or microphone is disabled in order to deploy the PyLangGhost RAT.

Fraudulent VPN and spam blocking applications associated with VexTrio are being utilized for advertisement deception and subscription scams.
Ad Fraud  | Malicious Apps | Subscription Scams

Fraudulent VPN and spam blocking applications associated with VexTrio are being utilized for advertisement deception and subscription scams.

Google’s Salesforce accounts have been compromised in a continuing cyber attack, resulting in the theft of user information by hackers.
Cybersecurity Threats | Data Breaches  | Social Engineering Tactics

Google’s Salesforce accounts have been compromised in a continuing cyber attack, resulting in the theft of user information by hackers.

Trend Micro has released patches for vulnerabilities in Apex One that were being exploited in the wild.
Cybersecurity Vulnerabilities  | Software Patching  | Threat Actor Exploits

Trend Micro has released patches for vulnerabilities in Apex One that were being exploited in the wild.

According to Meta, WhatsApp has removed 6.8 million accounts associated with criminal scam operations.
Criminal Activity | Scam Prevention | Social Media Security 

According to Meta, WhatsApp has removed 6.8 million accounts associated with criminal scam operations.

Mustang Panda is targeting Windows users with malware known as ToneShell, which disguises itself as Google Chrome.
Advanced Persistent Threats  | Cybersecurity Threats | Malware Distribution Techniques 

Mustang Panda is targeting Windows users with malware known as ToneShell, which disguises itself as Google Chrome.

PLoB: A Framework for Behavioral Fingerprinting to Detect Malicious Login Attempts.
AI Security Solutions  | Behavioral Fingerprinting | Intrusion Detection

PLoB: A Framework for Behavioral Fingerprinting to Detect Malicious Login Attempts.

Malicious actors exploit smart contracts to siphon over $900,000 from user cryptocurrency wallets.
Cybersecurity Threats | Ethereum Scams | Smart Contract Obfuscation 

Malicious actors exploit smart contracts to siphon over $900,000 from user cryptocurrency wallets.

Threat actors are using Generative AI to carry out phishing attacks by impersonating government websites.
AI-Enhanced Tactics | Government Impersonation  | Phishing Operations

Threat actors are using Generative AI to carry out phishing attacks by impersonating government websites.

UAC-0099 Hackers Exploiting HTA Files to Distribute MATCHBOIL Loader Malware
Cyber Warfare | Malware Development | Phishing Attacks 

UAC-0099 Hackers Exploiting HTA Files to Distribute MATCHBOIL Loader Malware

More than 1 million individuals affected by the DaVita data breach.
Data Breach | Personal Information Security  | Ransomware Attack

More than 1 million individuals affected by the DaVita data breach.

WhatsApp has introduced a new security feature that enables users to pause, inquire about, and verify potentially harmful messages.
Privacy Protection  | Scam Detection | Security Enhancements

WhatsApp has introduced a new security feature that enables users to pause, inquire about, and verify potentially harmful messages.

Salesforce instances at Google have been compromised in a continuing attack, resulting in hackers stealing user information.
Cybersecurity Threats | Data Breaches  | Social Engineering Tactics

Salesforce instances at Google have been compromised in a continuing attack, resulting in hackers stealing user information.

Pandora, the worldwide jewelry brand, has experienced a security breach resulting in the exposure of customer information.
Cybersecurity

Pandora, the worldwide jewelry brand, has experienced a security breach resulting in the exposure of customer information.

Page navigation

Previous PagePrevious 1 … 6 7 8 9 10 … 13 Next PageNext

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search