SIM Swapping Technique to Gain Access to Azure Machines
Researchers uncovered a financially motivated threat group known as ‘UNC3944’ which employs phishing and SIM-swapping techniques to seize control of Microsoft Azure admin accounts. Enabling...
Meet ‘Jack’ from Romania! Mastermind Behind Golden Chickens Malware
The identity of the second threat actor behind the Golden Chickens malware has been uncovered courtesy of a fatal operational security blunder, cybersecurity...
Notorious Cyber Gang FIN7 Returns Cl0p Ransomware in New Wave of Attacks
May 20, 2023Ravie LakshmananCyber Crime / Ransomware
The notorious cybercrime group known as FIN7 has been observed deploying Cl0p (aka Clop) ransomware, marking the...
Samsung Devices Under Active Exploitation! CISA Warns of Critical Flaw
May 20, 2023Ravie LakshmananMobile Security / Cyber Attack
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of a medium-severity flaw...
KeePass Password Vulnerability Let Hackers Gain Master Password
KeePass, a widely used password manager application, is vulnerable to a security flaw that gives the threat actors ability to extract the master password...
Developer Alert: NPM Packages for Node.js Hiding Dangerous TurkoRat Malware
Two malicious packages discovered in the npm package repository have been found to conceal an open source information stealer malware called TurkoRat.
The packages...
Privacy Sandbox Initiative: Google to Phase Out Third-Party Cookies Starting 2024
May 19, 2023Ravie LakshmananOnline Privacy / Tech News
Google has announced plans to officially flip the switch on its twice-delayed Privacy Sandbox initiatives as...
Keeper Password Vulnerability Let Hackers Gain Master Password
KeePass, a widely used password manager application, is vulnerable to a security flaw that gives the threat actors ability to extract the master password...
Dr. Active Directory vs. Mr. Exposed Attack Surface: Who’ll Win This Fight?
May 19, 2023The Hacker NewsThreat Protection / Attack Surface
Active Directory (AD) is among the oldest pieces of software still used in the production...
Searching for AI Tools? Watch Out for Rogue Sites Distributing RedLine Malware
May 19, 2023Ravie LakshmananArtificial Intelligence / Cyber Threat
Malicious Google Search ads for generative AI services like OpenAI ChatGPT and Midjourney are being used...