Malware-as-a-Service | Phishing Attacks | Remote Access Trojans TAG-150 creates CastleRAT using Python and C, broadening the capabilities of CastleLoader malware.
Browser Security Strategies | Credential Theft Prevention | Cybersecurity Threats Considering Browsers as a Vulnerability Target: Reevaluating Security for Scattered Spider
Certificate Management | Phishing Techniques | Security Risks How Poor Certificate Management Creates Vulnerabilities for Phishing and Man-in-the-Middle Attacks
Cybersecurity Cyber attackers are exploiting counterfeit OAuth applications in conjunction with the Tycoon Kit to compromise Microsoft 365 accounts.