New phishing and business email compromise campaigns increase in complexity, bypass MFA

Read the technical details about a new AiTM phishing attack combined with a BEC campaign as revealed by Microsoft, and learn how to mitigate this threat.
The post New phishing and business email compromise campaigns increase in complexity, bypass MFA a… Continue reading New phishing and business email compromise campaigns increase in complexity, bypass MFA

Zero-day MOVEit Transfer vulnerability exploited in the wild, heavily targeting North America

Read the technical details about this zero-day MoveIT vulnerability, find out who is at risk, and learn how to detect and protect against this cybersecurity threat.
The post Zero-day MOVEit Transfer vulnerability exploited in the wild, heavily targetin… Continue reading Zero-day MOVEit Transfer vulnerability exploited in the wild, heavily targeting North America

Chinese state-sponsored attack uses custom router implant to target European governments

Learn technical details about this cyberattack, as well as Check Point Research’s tips on how to detect and protect against this security threat.
The post Chinese state-sponsored attack uses custom router implant to target European governments appeared… Continue reading Chinese state-sponsored attack uses custom router implant to target European governments

PaperCut vulnerability abused by several threat actors could impact 70,000 organizations

Get technical details about how the cybercriminals are targeting this vulnerability, who is impacted, and how to detect and protect against this security threat.
The post PaperCut vulnerability abused by several threat actors could impact 70,000 organi… Continue reading PaperCut vulnerability abused by several threat actors could impact 70,000 organizations

Survey: Most CISOs feel their business is at risk for cyberattack

A new report from Proofpoint provides global insight into CISOs’ challenges, expectations and priorities for 2023.
The post Survey: Most CISOs feel their business is at risk for cyberattack appeared first on TechRepublic.
Continue reading Survey: Most CISOs feel their business is at risk for cyberattack

Threat actor APT28 targets Cisco routers with an old vulnerability

The U.S., Europe and Ukraine are reportedly targets in this malware threat. Learn how to protect affected Cisco routers.
The post Threat actor APT28 targets Cisco routers with an old vulnerability appeared first on TechRepublic.
Continue reading Threat actor APT28 targets Cisco routers with an old vulnerability

Google Play threats on the dark web are big business

Android infections are also prevalent on the dark web, according to Kaspersky. Learn how to keep your workforce safe from these mobile and BYOD security threats.
The post Google Play threats on the dark web are big business appeared first on TechRepubl… Continue reading Google Play threats on the dark web are big business

Phishing from threat actor TA473 targets US and NATO officials

These phishing campaigns are exploiting a Zimbra vulnerability and affecting internet-facing webmail services. Learn how to protect your organization from this security threat.
The post Phishing from threat actor TA473 targets US and NATO officials app… Continue reading Phishing from threat actor TA473 targets US and NATO officials

More phishing campaigns are using IPFS network protocol

Learn how IPFS is used in phishing attacks and why it’s especially tricky to remove the impacted pages, as well as how to protect from this security threat.
The post More phishing campaigns are using IPFS network protocol appeared first on TechRepublic… Continue reading More phishing campaigns are using IPFS network protocol