Top 5 AI-Powered Social Engineering Attacks
Social engineering has long been an effective tactic because of how it…
Malvertising Scam Uses Fake Google Ads to Hijack Microsoft Advertising Accounts
Feb 01, 2025Ravie LakshmananMalvertising / Mobile Security Cybersecurity researchers have discovered a…
Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks
Jan 29, 2025Ravie LakshmananThreat Intelligence / Malware The North Korean threat actor…
Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks
Jan 23, 2025Ravie LakshmananPhishing / Malware Cybersecurity researchers are calling attention to…
CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits
Jan 21, 2025Ravie LakshmananMalware / Cyber Threat The Computer Emergency Response Team…
New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption
Jan 09, 2025Ravie Lakshmanan Cybersecurity researchers have uncovered a new, stealthier version…
Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections
Cybersecurity researchers have found that bad actors are continuing to have success…
North Korean Hackers Pull Off $308M Bitcoin Heist from Crypto Firm DMM Bitcoin
Dec 24, 2024Ravie LakshmananCybercrime / Malware Japanese and U.S. authorities have formerly…
Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware
Dec 17, 2024Ravie LakshmananMalware / Credential Theft A new social engineering campaign…


