As per a post written by Halborn’s technical education specialist Luis Lubeck, the active phishing campaign used emails to target MetaMask users and trick them into giving out their passphrases.
Back in June of this year, Trend Micro research revealed that 89 percent of electricity, oil & gas, and manufacturing firms have experienced cyberattacks impacting production and energy supply over the past 12 months.
Raccoon is a malware family that has been sold as malware-as-a-service on underground forums since early 2019. In early July 2022, a new variant of this malware dubbed Raccoon Stealer v2 was released.
India’s digital transformation cannot be fashioned on the foundations of decades-old legal infrastructure like the Information Technology Act 2000 and the National Cyber Security Policy 2013, among others.
The online fraudsters put an effort into promoting the campaigns on various social media platforms or use compromised Facebook and YouTube to reach as many users as possible.
Microsoft warned against threat actors increasingly using malicious IIS web server extensions to backdoor unpatched Exchange servers. Between January and May, the attackers targeted several servers to access victims’ email mailboxes, steal credentials and sensitive data, and run commands. IIS modules are usually not used as backdoors as compared to general web application threats such […]
Microsoft connected the Knotweed threat actor to the Austrian surveillance firm DSIRF that has been targeting entities in Central America and Europe with the Subzero surveillance malware. Microsoft recommends patching the exploited flaws and confirming that Microsoft Defender is updated to detect related indicators.
The attackers receive compensation for the bandwidth by setting their email address for the user, while the victims might only notice some connectivity slowdowns and hiccups.
The US Cybersecurity and Infrastructure Security Agency (CISA) announced yesterday that it had signed a Memorandum of Cooperation (MoC) with the Ukrainian State Service of Special Communications and Information Protection of Ukraine (SSSCIP).
This malware uses the Contact Provider. The Contact Provider is the source of data you see in the device’s contacts application, and you can also access its data in your own application and transfer data between the device and online services.