Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting
Jan 16, 2025Ravie LakshmananSpear Phishing / Threat Intelligence The Russian threat actor known as Star Blizzard has been linked to...
Read more →Jan 16, 2025Ravie LakshmananSpear Phishing / Threat Intelligence The Russian threat actor known as Star Blizzard has been linked to...
Read more →Jan 16, 2025Ravie LakshmananMalware / Ransomware Threat actors have been observed concealing malicious code in images to deliver malware such...
Read more →Jan 16, 2025Ravie LakshmananActive Directory / Vulnerability Cybersecurity researchers have found that the Microsoft Active Directory Group Policy that’s designed...
Read more →Jan 16, 2025Ravie LakshmananVulnerability / Cybersecurity Details have emerged about a now-patched security vulnerability that could allow a bypass of...
Read more →Jan 16, 2025The Hacker NewsCertificate Management / Compliance The digital world is exploding. IoT devices are multiplying like rabbits, certificates...
Read more →You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the...
Read more →Jan 16, 2025Ravie LakshmananVulnerability / Endpoint Security Ivanti has rolled out security updates to address several security flaws impacting Avalanche,...
Read more →Jan 16, 2025Ravie LakshmananEndpoint Security / Ransomware Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a...
Read more →Jan 15, 2025Ravie LakshmananCryptocurrency / Malware The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign...
Read more →Jan 15, 2025Ravie LakshmananMalvertising / Malware Cybersecurity researchers have alerted to a new malvertising campaign that’s targeting individuals and businesses...
Read more →Jan 15, 2025Ravie LakshmananBlockchain / Cryptocurrency Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the...
Read more →Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with an IT security...
Read more →