Beyond the border scam, a new instance of the new Nigerian fraud
22
Feb
2024

Beyond the border scam, a new instance of the new Nigerian fraud

“Beyond the border scam”, pay attention to the instance of the new Nigerian fraud Pierluigi Paganini February 22, 2024 Security…

Bitwarden adds passkey support to log into web password vaults
22
Feb
2024

Bitwarden’s new auto-fill option adds phishing resistance

The Bitwarden open-source password management service has introduced a new inline auto-fill menu that addresses the risk of user credentials being…

Hackers Heavily Abusing Google Cloud Run to Deliver Banking Malware
22
Feb
2024

Hackers Heavily Abusing Google Cloud Run to Deliver Banking Malware

Large-scale malware distribution campaigns are abusing Google Cloud Run to transmit banking trojans, including Astaroth (also known as Guildma), Mekotio,…

Apex Code Vulnerabilities Let Hackers Steal Salesforce Data
22
Feb
2024

Apex Code Vulnerabilities Let Hackers Steal Salesforce Data

Hackers target Apex code vulnerabilities in Salesforce to exploit security weaknesses, gain unauthorized access to sensitive data, or manipulate the…

AT&T Outage Disrupts Service for Millions of Users Across US
22
Feb
2024

AT&T Outage Disrupts Service for Millions of Users Across US

You are not alone, an AT&T outage is happening across the United States, and the company is working to bring…

Cyber experts alarmed by ‘trivial’ ConnectWise vulns
22
Feb
2024

Cyber experts alarmed by ‘trivial’ ConnectWise vulns

A pair of newly-disclosed vulnerabilities in a widely-used remote desktop access application beloved of managed services providers (MSPs) is drawing…

LockBit
22
Feb
2024

ScreenConnect servers hacked in LockBit ransomware attacks

Attackers are exploiting a maximum severity authentication bypass vulnerability to breach unpatched ScreenConnect servers and deploy LockBit ransomware payloads on…

Russian Government Software Hijacked to Konni RAT
22
Feb
2024

Russian Government Software Hijacked to Konni RAT

A critical cybersecurity incident recently occurred where the Konni Remote Access Trojan (RAT), a highly covert and sophisticated malware that…

How to Analyse Linux Malware in ANY.RUN
22
Feb
2024

How to Analyse Linux Malware in ANY.RUN

Linux, traditionally viewed as a more secure operating system than Windows, has experienced a notable increase in malware attacks. In…

Apple Shortcuts Vulnerability Exposes Sensitive Data, Update Now!
22
Feb
2024

Apple Shortcuts Vulnerability Exposes Sensitive Data, Update Now!

Apple Shortcuts security vulnerability (CVE-2024-23204) allows attackers to access targeted devices and steal sensitive data – update your devices now!…

Toshiba and Orange offer quantum secure data transmission with utmost security
22
Feb
2024

Toshiba and Orange offer quantum secure data transmission with utmost security

Toshiba, the Japanese electronics giant, and Orange, a major telecom company, have unveiled breakthroughs in quantum secure data transmission. Their…

Why ransomware gangs love using RMM tools—and how to stop them
22
Feb
2024

Why ransomware gangs love using RMM tools—and how to stop them

One of the most alarming trends our ThreatDown Intelligence team has noticed lately is the increased exploitation of legitimate Remote…