Data Theft Techniques | Malvertising Campaigns | Rogue Browser Extensions Counterfeit Madgicx Plus and SocialMetrics extensions hijacking Meta business accounts
Phishing Techniques | Targeted Industries | Two-Factor Authentication Bypass New phishing tool Salty2FA bypasses two-factor authentication
macOS Security Threats | Malware Campaigns | Phishing Attacks Hidden SVG files launch base64-encoded phishing sites
Browser Security Strategies | Credential Theft Prevention | Cybersecurity Threats Considering Browsers as a Vulnerability Target: Reevaluating Security for Scattered Spider
Cloud Security Vulnerabilities | Cybersecurity Threats | Ransomware Tactics Storm-0501 utilizes Entra ID to extract and erase Azure data during hybrid cloud attacks
Credential Theft | Cyber Espionage | Malware Persistence New APT group ‘Curly COMrades’ targeting Georgia and Moldova
Credential Theft | Malicious Software | Social Media Automation Tools RubyGems and PyPI have both experienced attacks involving harmful packages that are designed to steal credentials and cryptocurrency
Cryptocurrency Theft | Cybersecurity Threats | Malicious Browser Extensions GreedyBear has swindled $1 million in cryptocurrency by employing over 150 harmful Firefox wallet extensions.
Email Security Exploitation | Social Engineering Techniques | Spear Phishing Microsoft 365’s Direct Send feature has been exploited to circumvent email security measures.
Attack Techniques | Ransomware Operations | Targeted Industries Akira and Lynx ransomware are targeting Managed Service Providers (MSPs) by exploiting stolen login credentials and existing vulnerabilities.
Cybercrime | E-commerce Security | Phishing Attacks Over 10,000 harmful TikTok Shop websites are targeting users to obtain login details and distribute malware.
Credential Theft | Cybersecurity Threats | Phishing Campaign APT36 Hackers Targeting Indian Government Organizations to Harvest Login Information
Cyber Espionage | Malware Techniques | Social Engineering Kimsuky APT hackers are utilizing LNK files as a means to deploy reflective malware, successfully evading detection by Windows Defender.