Okta Warns of Phishing Attacks Mimic Okta Support to Steal MFA Tokens
Okta, a leading identity and access management platform, has issued a warning about an increase in sophisticated phishing attacks targeting its customers by impersonating the…
Okta, a leading identity and access management platform, has issued a warning about an increase in sophisticated phishing attacks targeting its customers by impersonating the…
Global cybercrime costs are rising rapidly, with estimates reaching $10.5 trillion by 2025, according to Cybersecurity Ventures. These financial hits stem from issues like damaged or…
This is no secret, online criminals are leveraging artificial intelligence (AI) and large language models (LLMs) in their malicious schemes. While AI tends to be…
Dec 18, 2024The Hacker NewsThreat Detection / Endpoint Security Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders is…
As is common nowadays, a lack of skilled workers in the sector left firms competing for tech talent in 2024, alongside a stagnant diversity in…
In the absence of these considerations, systems can be retrofitted with ineffective security controls or lack them entirely. This can be attributed to teams rushing…
A sophisticated attack campaign leveraging Cloudflare’s Workers service to distribute malicious applications disguised as legitimate software. The Computer Emergency Response Team of Ukraine (CERT-UA) reported…
RiseLoader, a new malware family discovered in October 2024, leverages a custom TCP-based binary protocol similar to RisePro for downloading and executing second-stage payloads. Despite…
Dec 18, 2024Ravie LakshmananCyber Espionage / Malware The Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as part of…
It’s been quite the half-decade. In fact, it’s hard to know where to start when reflecting on it. The Covid-19 pandemic saw a (forced) mass…
INTERPOL is advocating for a shift in terminology to combat online relationships and investment fraud. The international police organization is urging the replacement of the…
The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing campaigns. Delivered as attachments disguised as archives or Microsoft 365 files,…