Threat Actors Exploit Microsoft Sway to Host QR Code Phishing Campaigns
Threat actors are abusing Microsoft Sway to host QR Code phishing campaigns. Continue reading Threat Actors Exploit Microsoft Sway to Host QR Code Phishing Campaigns
Collaborate Disseminate
Threat actors are abusing Microsoft Sway to host QR Code phishing campaigns. Continue reading Threat Actors Exploit Microsoft Sway to Host QR Code Phishing Campaigns
A new malware called NGate allows cybercriminals to steal near field communication data from Android phones via sophisticated social engineering. The data is relayed to the fraudsters before being used to steal cash. Continue reading Cybercriminals Deploy New Malware to Steal Data via Android’s Near Field Communication (NFC)
A new report from cyber threat intelligence company Intel471 reveals that threat actors are infiltrating macOS. Continue reading Threat Actors Increasingly Target macOS, Report Finds
Read more about a China-aligned cyberespionage threat actor dubbed StormBamboo, also known as Evasive Panda, which compromised an Internet Service Provider and infected targets with malware. Continue reading StormBamboo Compromises ISP, Spreads Malware
Read about the new Cisco Talos report on the top ransomware groups’ techniques and learn how to mitigate this cybersecurity risk. Cisco Talos observed the TTPs used by 14 of the most prevalent ransomware groups based on their volume of attack, impact t… Continue reading Cisco Talos: Top Ransomware TTPs Exposed
A threat actor exploited the Snowflake platform to target organizations for data theft and extortion using compromised credentials. Learn how to protect your business from this threat. Continue reading Mandiant Report: Snowflake Users Targeted for Data Theft and Extortion
Find out how the cyberespionage threat actor LilacSquid operates, and then learn how to protect your business from this security risk. Continue reading Cisco Talos: LilacSquid Threat Actor Targets Multiple Sectors Worldwide With PurpleInk Malware
This new report also indicates an increasing attack surface as putting pressure on CISOs. One positive note is CISOs’ improving relationships with board members. Continue reading Proofpoint’s CISO 2024 Report: Top Challenges Include Human Error & Risk
Find out how Grandoreiro banking trojan campaigns work and the countries targeted, as well as how to mitigate this malware threat. Continue reading IBM X-Force Report: Grandoreiro Malware Targets More Than 1,500 Banks in 60 Countries
Read about Black Basta ransomware’s impact and how to mitigate it. Plus, learn about recent ransomware trends. Continue reading Black Basta Ransomware Struck More Than 500 Organizations Worldwide