CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities
Oct 26, 2024Ravie LakshmananCyber Attack / Threat Intelligence The Computer Emergency Response…
Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans
Russian-speaking users have become the target of a new phishing campaign that…
Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials
Oct 20, 2024Ravie LakshmananVulnerability / Email Security Unknown threat actors have been…
INTERPOL Recovers $41 Million in Largest Ever BEC Scam in Singapore
Aug 06, 2024Ravie LakshmananEmail Security / Financial Fraud INTERPOL said it devised…
Cybercriminals Abusing Cloudflare Tunnels to Evade Detection and Spread Malware
Aug 02, 2024Ravie LakshmananMalware / Network Security Cybersecurity companies are warning about…
Critical Exim Mail Server Vulnerability Exposes Millions to Malicious Attachments
Jul 12, 2024NewsroomVulnerability / Software Security A critical security issue has been…
Military-themed Email Scam Spreads Malware to Infect Pakistani Users
Jun 21, 2024NewsroomPhishing Attack / Email Security Cybersecurity researchers have shed light…
How to Use Tines’s SOC Automation Capability Matrix
Created by John Tuckner and the team at automation and AI-powered workflow…