March 19, 2024PressroomEmail Security/Social Engineering Threat actors are exploiting digital document publishing (DDP) sites hosted on platforms such as FlipSnack, Issuu, Marq, Publuu, RelayTo, and Simplebooklet to perform phishing, credential…
Category: Cyber Security
“Conversation overflow” cyber attacks bypass AI security to target executives
A new cyber-attack method called “Conversation Overflow” has emerged, attempting to slip credential-harvesting phishing emails past artificial intelligence (AI) and machine learning (ML)-enabled security platforms. . Emails can slip through…
E-Root Marketplace Administrator Sentenced to 42 Months for Selling 350,000 Stolen Credentials
March 19, 2024PressroomIntel Threat/Cybercrime A 31-year-old Moldovan citizen has been sentenced to 42 months in prison in the United States for operating an illicit marketplace called E-Root Marketplace that offered…
Malware on company computers exposed customer data
Global business technology giant Fujitsu has apologized for leaking customer data, following an investigation precipitated by the discovery of malware on the company’s computers. Japanese society confirmed the cyber incident…
New phishing attack uses Microsoft Office clever trick to deploy NetSupport RAT
March 19, 2024PressroomSocial engineering/email security A new phishing campaign is targeting US organizations with the intent to deploy a remote access trojan called NetSupport RAT. Israeli cybersecurity firm Perception Point…
Brazilian authorities arrest members of banking Trojan cybercrime group
With the help of The one from Interpol cybercrime unit, Brazilian authorities recently made progress in combating the infamous Grandoreiro banking trojan operation with the arrest of five suspects allegedly…
China’s “Earth Krahang” APT compromises 48 government organizations across 5 continents
A previously unidentified Chinese spy group has managed to breach at least 70 organizations in 23 countries, including 48 in government settings, despite using fairly standard tactics, techniques and procedures…
North Korea-linked group launches multi-phase cyberattack against South Korea
North Korea-linked threat group Kimsuky has adopted a longer, eight-step attack chain that abuses legitimate cloud services and employs evasive malware to conduct cyber espionage and financial crimes against South…
The next big target of supply chain attack
Repositories for machine learning models like Hugging Face give threat actors the same opportunities to introduce malicious code into development environments such as public open source repositories such as npm…
Saudi Arabia’s National Cyber Security Authority announces GCF 2024 Annual Meeting
PRESS RELEASE RIYADH, 18 March 2024 – Saudi Arabia’s National Cybersecurity Authority (NCA) has announced the 2024 annual meeting of the Global Cybersecurity Forum (GCF), which will be held in…