Spooky action: Phantom domains create hijackable hyperlinks

According to a recent paper published at the 2024 Web Conference, so-called “phantom domains” make it possible for malicious actors to hijack hyperlinks and exploit users’ trust in familiar websites. The research defines phantom domains as active links to dot-com domains that have never been registered. Here’s what enterprises need to know about how phantom domains […]

The post Spooky action: Phantom domains create hijackable hyperlinks appeared first on Security Intelligence.

Continue reading Spooky action: Phantom domains create hijackable hyperlinks

Blackwood APT delivers malware by hijacking legitimate software update requests

ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group, which they dubbed Blackwood. Blackwood has carried out cyberespionage operations against individuals and companies from China, Japan, and the United… Continue reading Blackwood APT delivers malware by hijacking legitimate software update requests

Stop audience hijacking and defend against redirection to malicious websites

The holidays are just around the corner, and the competition for consumer attention and dollars promises to be fierce. According to Akamai research, up to 20% of potential online retail customers have their shopping experience disrupted – or worse, div… Continue reading Stop audience hijacking and defend against redirection to malicious websites

Cookie Hijacking: More Dangerous Than it Sounds

Multifactor authentication (MFA) is a great way to prevent threat actors from using stolen credentials to access your network. But with remote work becoming the norm and the attack surface widening with more apps, devices and systems connecting than ever before, threat actors are working overtime to beat MFA. Cookie hijacking in particular is a […]

The post Cookie Hijacking: More Dangerous Than it Sounds appeared first on Security Intelligence.

Continue reading Cookie Hijacking: More Dangerous Than it Sounds

New AI algorithm to detect cryptocurrency miners as they steal power

Computer scientists have developed a new artificial intelligence (AI) system that may be able to identify malicious codes that hijack supercomputers to mine for cryptocurrency such as Bitcoin and Monero. “Based on recent computer break-ins in Eur… Continue reading New AI algorithm to detect cryptocurrency miners as they steal power

New wave of attacks aiming to rope home routers into IoT botnets

A Trend Micro research is warning consumers of a major new wave of attacks attempting to compromise their home routers for use in IoT botnets. The report urges users to take action to stop their devices from enabling this criminal activity. The importa… Continue reading New wave of attacks aiming to rope home routers into IoT botnets

83% of Global 2000 enterprises have not adopted basic domain security practices

There are significant shortfalls in enterprise domain security practices, putting organizations’ internet-facing digital assets at risk to threats, including domain name and DNS hijacking, phishing, and other fraudulent activity, a CSC report reveals. … Continue reading 83% of Global 2000 enterprises have not adopted basic domain security practices