Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks
Jan 23, 2025Ravie LakshmananPhishing / Malware Cybersecurity researchers are calling attention to…
How to Eliminate Identity-Based Threats
Despite significant investments in advanced technologies and employee training programs, credential and…
13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks
Jan 21, 2025Ravie LakshmananEmail Security / Botnet A global network of about…
New ‘Sneaky 2FA’ Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass
Jan 17, 2025Ravie LakshmananCybersecurity / Threat Intelligence Cybersecurity researchers have detailed a…
Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws
Jan 16, 2025Ravie LakshmananEndpoint Security / Ransomware Cybersecurity researchers have detailed an…
Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes
Jan 15, 2025Ravie LakshmananMalvertising / Malware Cybersecurity researchers have alerted to a…
WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables
Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign…
RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns
Jan 10, 2025Ravie LakshmananCyber Espionage / Cyber Attack Mongolia, Taiwan, Myanmar, Vietnam,…
New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption
Jan 09, 2025Ravie Lakshmanan Cybersecurity researchers have uncovered a new, stealthier version…