X Account of Google Cybersecurity Firm Mandiant Hacked in Crypto Scam
The attacker utilized the compromised Mandiant account to promote a cryptocurrency scam by posing as the Phantom crypto wallet and luring users with a fake…
The attacker utilized the compromised Mandiant account to promote a cryptocurrency scam by posing as the Phantom crypto wallet and luring users with a fake…
Jan 04, 2024NewsroomCryptocurrency Miner / Malware Three new malicious packages have been discovered in the Python Package Index (PyPI) open-source repository with capabilities to deploy…
The Spanish unit of telecoms provider Orange, the telecommunications behemoth, encountered disruptions in its internet services due to cyberattack. Users from various networks reported connectivity…
Peru-based financial organization Maquisistema has been allegedly impacted by a data breach. A threat actor going by the alias “God User” has claimed responsibility for…
Previously, in December 2023, it was reported that SSH servers were vulnerable to the new Terrapin Attack in which threat actors can downgrade an SSH…
A free and open-source packet analyzer, Wireshark is used for network troubleshooting, education, software and communications protocol development, and analysis. The widespread use of Wireshark…
In recent months, a staggering 29 malware families have been discovered targeting approximately 1800 banking applications worldwide. This revelation, based on a comprehensive survey conducted…
Malicious stockpiled domains are the collection of domain names that threat actors acquire in advance for several types of future malicious activities like:- Phishing attacks…
Active Directory infiltration methods exploit vulnerabilities or weaknesses in Microsoft’s Active Directory to gain unauthorized access. Active Directory is a central component in many organizations,…
Over the holidays, the npm package registry was flooded with more than 3,000 packages, including one called “everything,” and others named a variation of the word. The…
On Wednesday, the London Public Library stated that certain workers’ personal information was stolen by the hackers responsible for the incident. However, there is no…
Jan 04, 2024NewsroomSoftware Security / Malware The threat actor known as UAC-0050 is leveraging phishing attacks to distribute Remcos RAT using new strategies to evade…