Month: November 2022

Hackers Abusing Microsoft Dynamics 365 Customer Voice to Steal Credentials
Check Point Software company Avanan has shared details of how hackers are trying to abuse Dynamics 365 Customer Voice in their recent findings. According to Avanan’s research, threat actors abuse authentic-looking links from Microsoft notifications to deliver credential-stealing pages. The...

Researchers Uncover 29 Malicious PyPI Packages Targeted Developers with W4SP Stealer
Cybersecurity researchers have uncovered 29 packages in Python Package Index (PyPI), the official third-party software repository for the Python programming language, that aim to infect developers’ machines with a malware called W4SP Stealer. “The main attack seems to have started...

Microsoft Warns of Uptick in Hackers Leveraging Publicly-Disclosed 0-Day Vulnerabilities
Microsoft is warning of an uptick among nation-state and criminal actors increasingly leveraging publicly-disclosed zero-day vulnerabilities for breaching target environments. The tech giant, in its 114-page Digital Defense Report, said it has “observed a reduction in the time between the...

DDoS Attack From Killnet Threat Group Frustrated By The US Treasury
Posted on November 5, 2022 at 6:02 AM The US Treasury Department stated recently that it blocked a distributed denial of service (DDoS) attack linked to the Russian hacktivist group Killnet. The same group claimed responsibility for hitting on over...

OPERA1ER – An Advanced Threat Actor Group Stole At Least $11 Million From Banks & Telcos
The OPERA1ER threat group used off-the-shelf hacking tools to steal approximately $11 million from banks and telecommunications service providers throughout Africa. Over 35 successful cyberattacks have been carried out by hackers between 2018 and 2022, and in 2020 approximately a...

AS Roma’s Paulo Dybala is the new face of Web3 soccer game MonkeyLeague
MonkeyLeague is a Web2 strategy soccer game. It is deployed on the Solana network, and initial game versions will be released in Q4 2022. According to a press release from MonkeyLeague developers, AS Roma’s Paulo Dybala is the game’s official...

SandStrike – Previously Unknown Android Malware Attacks Android Users Via VPN App
Android users are being targeted by threat actors using spyware known as SandStrike, which is delivered via malware-infected VPN applications. In short, threat actors have been circulating extremely stealthy and sophisticated spyware inside a VPN application. Cybersecurity researchers at Kaspersky...

Hacker Appreciation Month: Badge Awards
Celebrating the accomplishments of hackers is something we want to do year-round. However, we decided we wanted to root Cyber Security Awareness month and give it our own spin. At the start of October, as part of Hacker Appreciation Month,...

Researchers Detail New Malware Campaign Targeting Indian Government Employees
The Transparent Tribe threat actor has been linked to a new campaign aimed at Indian government organizations with trojanized versions of a two-factor authentication solution called Kavach. “This group abuses Google advertisements for the purpose of malvertising to distribute backdoored...

Benefits of Vulnerability Assessment – A Detailed Guide
We all know that vulnerability assessment is very important nowadays, and that’s why most of companies use this assessment. Whether the company is small or it is a large IT sector, everyone needs to protect their company from cyberattacks, especially...

4 Major Benefits of Next Gen SIEM
Security analysts are up against more cyberattacks than ever, increased attack surfaces, and more protective tools on the cloud and premises than ever before. All of that is accompanied by cybersecurity experts that are leaving the field. Stress, poor company...

Why Identity & Access Management Governance is a Core Part of Your SaaS Security
Every SaaS app user and login is a potential threat; whether it’s bad actors or potential disgruntled former associates, identity management and access control is crucial to prevent unwanted or mistaken entrances to the organization’s data and systems. Since enterprises...