Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks

Authorities in Nigeria have announced the arrest of three “high-profile internet fraud suspects” who are alleged to have been involved in phishing attacks targeting major corporations, including the main developer behind the RaccoonO365 phishing-as-a-s… Continue reading Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks

Posted in Uncategorized

North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers

Data from Chainalysis and Amazon offers a glimpse into North Korea’s cyber activities surrounding cryptocurrency theft and fake IT workers.
The post North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers appeared… Continue reading North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers

Cloud Atlas activity in the first half of 2025: what changed

Kaspersky expert describes new malicious tools employed by the Cloud Atlas APT, including implants of their signature backdoors VBShower, VBCloud, PowerShower, and CloudAtlas. Continue reading Cloud Atlas activity in the first half of 2025: what changed

New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards

Certain motherboard models from vendors like ASRock, ASUSTeK Computer, GIGABYTE, and MSI are affected by a security vulnerability that leaves them susceptible to early-boot direct memory access (DMA) attacks across architectures that implement a Unifie… Continue reading New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards

Posted in Uncategorized

Italian Ferry Malware Attack Sparks International Probe

French intelligence agencies uncovered what appears to be a coordinated foreign interference operation targeting the GNV Fantastic.
The post Italian Ferry Malware Attack Sparks International Probe appeared first on TechRepublic.
Continue reading Italian Ferry Malware Attack Sparks International Probe

Yet another DCOM object for lateral movement

Kaspersky expert describes how DCOM interfaces can be abused to load malicious DLLs into memory using the Windows Registry and Control Panel. Continue reading Yet another DCOM object for lateral movement