Hackers Abusing Microsoft Dynamics 365 Customer Voice to Steal Credentials

Hackers Abusing Microsoft Dynamics 365 Customer Voice to Steal Credentials

Check Point Software company Avanan has shared details of how hackers are trying to abuse Dynamics 365 Customer Voice in their recent findings. According to Avanan’s research, threat actors abuse authentic-looking links from Microsoft notifications to deliver credential-stealing pages. The...

/ November 5, 2022
Researchers Uncover 29 Malicious PyPI Packages Targeted Developers with W4SP Stealer

Researchers Uncover 29 Malicious PyPI Packages Targeted Developers with W4SP Stealer

Cybersecurity researchers have uncovered 29 packages in Python Package Index (PyPI), the official third-party software repository for the Python programming language, that aim to infect developers’ machines with a malware called W4SP Stealer. “The main attack seems to have started...

/ November 5, 2022
Microsoft Warns of Uptick in Hackers Leveraging Publicly-Disclosed 0-Day Vulnerabilities

Microsoft Warns of Uptick in Hackers Leveraging Publicly-Disclosed 0-Day Vulnerabilities

Microsoft is warning of an uptick among nation-state and criminal actors increasingly leveraging publicly-disclosed zero-day vulnerabilities for breaching target environments. The tech giant, in its 114-page Digital Defense Report, said it has “observed a reduction in the time between the...

/ November 5, 2022
DDoS Attack From Killnet Threat Group Frustrated By The US Treasury

DDoS Attack From Killnet Threat Group Frustrated By The US Treasury

Posted on November 5, 2022 at 6:02 AM The US Treasury Department stated recently that it blocked a distributed denial of service (DDoS) attack linked to the Russian hacktivist group Killnet. The same group claimed responsibility for hitting on over...

/ November 5, 2022
OPERA1ER – An Advanced Threat Actor Group Stole At Least $11 Million From Banks & Telcos

OPERA1ER – An Advanced Threat Actor Group Stole At Least $11 Million From Banks & Telcos

The OPERA1ER threat group used off-the-shelf hacking tools to steal approximately $11 million from banks and telecommunications service providers throughout Africa. Over 35 successful cyberattacks have been carried out by hackers between 2018 and 2022, and in 2020 approximately a...

/ November 4, 2022
AS Roma’s Paulo Dybala is the new face of Web3 soccer game MonkeyLeague

AS Roma’s Paulo Dybala is the new face of Web3 soccer game MonkeyLeague

MonkeyLeague is a Web2 strategy soccer game. It is deployed on the Solana network, and initial game versions will be released in Q4 2022. According to a press release from MonkeyLeague developers, AS Roma’s Paulo Dybala is the game’s official...

/ November 4, 2022
SandStrike – Previously Unknown Android Malware Attacks Android Users Via VPN App

SandStrike – Previously Unknown Android Malware Attacks Android Users Via VPN App

Android users are being targeted by threat actors using spyware known as SandStrike, which is delivered via malware-infected VPN applications. In short, threat actors have been circulating extremely stealthy and sophisticated spyware inside a VPN application. Cybersecurity researchers at Kaspersky...

/ November 4, 2022
Hacker Appreciation Month: Badge Awards

Hacker Appreciation Month: Badge Awards

Celebrating the accomplishments of hackers is something we want to do year-round. However, we decided we wanted to root Cyber Security Awareness month and give it our own spin. At the start of October, as part of Hacker Appreciation Month,...

/ November 4, 2022
Researchers Detail New Malware Campaign Targeting Indian Government Employees

Researchers Detail New Malware Campaign Targeting Indian Government Employees

The Transparent Tribe threat actor has been linked to a new campaign aimed at Indian government organizations with trojanized versions of a two-factor authentication solution called Kavach. “This group abuses Google advertisements for the purpose of malvertising to distribute backdoored...

/ November 4, 2022
Benefits of Vulnerability Assessment – A Detailed Guide

Benefits of Vulnerability Assessment – A Detailed Guide

We all know that vulnerability assessment is very important nowadays, and that’s why most of companies use this assessment. Whether the company is small or it is a large IT sector, everyone needs to protect their company from cyberattacks, especially...

/ November 4, 2022
4 Major Benefits of Next Gen SIEM

4 Major Benefits of Next Gen SIEM

Security analysts are up against more cyberattacks than ever, increased attack surfaces, and more protective tools on the cloud and premises than ever before. All of that is accompanied by cybersecurity experts that are leaving the field. Stress, poor company...

/ November 3, 2022
Why Identity & Access Management Governance is a Core Part of Your SaaS Security

Why Identity & Access Management Governance is a Core Part of Your SaaS Security

Every SaaS app user and login is a potential threat; whether it’s bad actors or potential disgruntled former associates, identity management and access control is crucial to prevent unwanted or mistaken entrances to the organization’s data and systems. Since enterprises...

/ November 3, 2022