Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts
Microsoft is calling attention to an emerging threat cluster it calls Storm-2372…
AI-Powered Social Engineering: Ancillary Tools and Techniques
Social engineering is advancing fast, at the speed of generative AI. This…
Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners
Feb 13, 2025Ravie LakshmananWeb Security / Cloud Security A widespread phishing campaign…
North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack
Feb 12, 2025Ravie LakshmananIT Security / Cybercrime The North Korea-linked threat actor…
8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation
Feb 11, 2025Ravie LakshmananCybercrime / RansomwareSource: The Nation A coordinated law enforcement…
AI-Powered Social Engineering: Reinvented Threats
The foundations for social engineering attacks – manipulating humans – might not…
Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign
Feb 05, 2025Ravie LakshmananCryptocurrency / Data Breach The North Korea-linked Lazarus Group…
Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections
Feb 04, 2025Ravie LakshmananVulnerability / Cyber Espionage A recently patched security vulnerability…
Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware
A Russian-speaking cybercrime gang known as Crazy Evil has been linked to…


