Malware-as-a-Service | Phishing AttacksĀ | Remote Access TrojansĀ TAG-150 creates CastleRAT using Python and C, broadening the capabilities of CastleLoader malware.
Browser Security Strategies | Credential Theft PreventionĀ | Cybersecurity Threats Considering Browsers as a Vulnerability Target: Reevaluating Security for Scattered Spider
Certificate Management | Phishing TechniquesĀ | Security Risks How Poor Certificate Management Creates Vulnerabilities for Phishing and Man-in-the-Middle Attacks
Cybersecurity Cyber attackers are exploiting counterfeit OAuth applications in conjunction with the Tycoon Kit to compromise Microsoft 365 accounts.