Global Phishing Network Busted In Cross-Continent Operation
19
Sep
2024

Global Phishing Network Busted In Cross-Continent Operation

In an unprecedented move, Europol and Ameripol worked together to dismantle a phishing-as-a-service network affecting over 480,000 victims worldwide. The…

QUT builds AI into multi-year digital connections program
19
Sep
2024

QUT builds AI into multi-year digital connections program – Cloud – Software

QUT has opened a new avenue in its multi-year digital connections program, using data and AI to improve the ability…

Hacker and smartphones
19
Sep
2024

Police dismantles phone unlocking ring linked to 483,000 victims

A joint law enforcement operation has dismantled an international criminal network that used the iServer automated phishing-as-a-service platform to unlock the stolen…

Red Teaming C2 Frameworks
19
Sep
2024

Open Source C2 Frameworks Used In Red Teaming Vulnerable To RCE Attacks

A C2 framework is an architecture that controls and maintains access to compromised systems. Its purpose is to allow you…

This Windows PowerShell Phish Has Scary Potential – Krebs on Security
19
Sep
2024

This Windows PowerShell Phish Has Scary Potential – Krebs on Security

Many GitHub users this week received a novel phishing email warning of critical security holes in their code. Those who…

Hackerone logo
19
Sep
2024

Introducing HackerOne Automations | HackerOne

Efficiency and accuracy are crucial in vulnerability remediation. Yet, repetitive and manual handling of tasks throughout the vulnerability lifecycle remains…

Tor says it’s "still safe" amid reports of police deanonymizing users
19
Sep
2024

Tor says it’s “still safe” amid reports of police deanonymizing users

The Tor Project is attempting to assure users that the network is still safe after a recent investigative report warned…

Hackers Using Supershell Malware To Attack Linux SSH Servers
19
Sep
2024

Hackers Using Supershell Malware To Attack Linux SSH Servers

Supershell is a command-and-control (C2) remote control platform that operates through web services. It allows users to establish a reverse…

International law enforcement operation dismantled criminal communication platform Ghost
19
Sep
2024

International law enforcement operation dismantled criminal communication platform Ghost

International law enforcement operation dismantled criminal communication platform Ghost Pierluigi Paganini September 19, 2024 An international law enforcement operation infiltrated…

Ivanti
19
Sep
2024

Ivanti warns of another critical CSA flaw exploited in attacks

Image: MidjourneyToday, Ivanti warned that threat actors are exploiting another Cloud Services Appliance (CSA) security flaw in attacks targeting a…

Fox Kitten's Hidden Infrastructure & New IOCs Uncovered
19
Sep
2024

Fox Kitten’s Hidden Infrastructure & New IOCs Uncovered

Fox Kitten (aka Pioneer Kitten or Parisite) is an Iranian cyber threat group that has been active since at least…

Threat Actors Forcing Victims Into Entering Login Credentials For Stealing
19
Sep
2024

Threat Actors Forcing victims Into Entering Login Credentials For Stealing

Recent intelligence indicates a new technique employed by stealers to trick victims into entering credentials directly into a browser, enabling…