18 Nov Glitch service abused to host short-lived phishing sites Phishing actors are now actively abusing the Glitch platform to host short-lived credential-stealing URLs for free while evading detection and takedowns. […]
18 Nov North Korean cyberspies target govt officials with custom malware A state-sponsored North Korean threat actor tracked as TA406 was recently observed deploying custom info-stealing malware in espionage campaigns. […]
17 Nov TikTok phishing threatens to delete influencers’ accounts Researchers have observed a new phishing campaign primarily targeting high-profile TikTok accounts belonging to influencers, brand consultants, production studios, and influencers’ managers. […]
17 Nov Victims of $2 billion BitConnect fraud to get back $57 million U.S. law enforcement authorities will start liquidating roughly $57 million worth of cryptocurrency seized from the now-defunct BitConnect crypto exchange to provide some restitution to defrauded investors. […]
17 Nov US, UK warn of Iranian hackers exploiting Microsoft Exchange, Fortinet US, UK, and Australian cybersecurity agencies warned today of ongoing exploitation of Microsoft Exchange ProxyShell and Fortinet vulnerabilities linked to an Iranian-backed hacking group. […]
17 Nov CISA releases cybersecurity response plans for federal agencies The Cybersecurity and Infrastructure Security Agency (CISA) has released new cybersecurity response plans (known as playbooks) for federal civilian executive branch (FCEB) agencies. […]
17 Nov Microsoft starts rolling out a new Windows 11 media player Microsoft is now rolling out a new media player that matches Windows 11’s look and feel as a replacement for the Windows 10 Groove Music and (in the future) the legacy Windows Media Player app. […]
16 Nov WordPress sites are being hacked in fake ransomware attacks A new wave of attacks starting late last week has hacked close to 300 WordPress sites to display fake encryption notices, trying to trick the site owners into paying 0.1 bitcoin for restoration. […]
16 Nov These are the cryptomixers hackers use to clean their ransoms Cryptomixers have always been at the epicenter of cybercrime activity, allowing hackers to “clean” cryptocurrency stolen from victims and making it hard for law enforcement to track them. […]
16 Nov Microsoft adds AI-driven ransomware protection to Defender Microsoft has introduced an AI-driven ransomware attack detection system for Microsoft Defender for Endpoint customers that complements existing cloud protection by evaluating risks and blocking actors at the perimeter. […]