W3LL phishing kit hijacks thousands of Microsoft 365 accounts, bypasses MFA
A threat actor known as W3LL developed a phishing kit that can bypass multi-factor authentication along with other tools that compromised more than 8,000 Microsoft…
A threat actor known as W3LL developed a phishing kit that can bypass multi-factor authentication along with other tools that compromised more than 8,000 Microsoft…
An organisation’s attitudes to cybersecurity are almost as important as the steps taken to prevent such attacks. Regardless, when something does go wrong, blame culture…
AtlasVPN developers are working on a patch for an IP leak vulnerability whose details were made public by a researcher who decided to take the…
It’s a fact that all organisations are valuable targets for cybercriminals, no matter the size of the organisation. However, some sectors are targeted more than…
Sep 06, 2023THNCyber Crime / Email Security A previously undocumented “phishing empire” has been linked to cyber attacks aimed at compromising Microsoft 365 business email…
As India prepares for the forthcoming G20 Summit 2023 in the nation’s capital, Delhi, this September, cybersecurity concerns are rising as hackers appear to set…
The usage of Blueshell malware spikes up by various threat actors to target Windows, Linux, and other operating systems across Korea and Thailand. Blueshell backdoor…
Sep 06, 2023THNCyber Attack / Critical Infrastructure The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday said it thwarted a cyber attack against an…
ASUS routers are affected by three critical remote code execution flaws Pierluigi Paganini September 06, 2023 Three critical remote code execution vulnerabilities in ASUS routers…
A Privilege Escalation was recently discovered, which affects Windows’s File History service and can be used by threat actors to gain escalated privileges on a…
The Indian Cyber Force (ICF) hackers group has claimed a series of precise cyber assaults on critical infrastructure in multiple nations, spanning Bangladesh, China, Pakistan,…
Recent reports indicate two vulnerabilities relating to information disclosure and remote code execution in MinIO, and their proof of concept was publicly disclosed. Threat actors…