Warner Music Group websites hacked for almost 5 months

Several online stores of the Warner Music Group (WMG) were compromised and what appears to be web skimmers were installed.

Read more

SharePoint and OneNote Being Used to Harvest Credentials

Following up on a received spam email, researchers from Naked Security have uncovered a phishing scheme designed to gain access

Read more

DoS and DDoS Attacks against Multiple Sectors

The Cybersecurity and Infrastructure Security Agency (CISA) is aware of open-source reporting of targeted denial-of-service (DoS) and distributed denial-of-service (DDoS)

Read more

Dharma ransomware used in recent attacks

A cyber security firm has reported that a number of recent cyber attacks in Asia are the result of hackers using

Read more

More fake Amazon domains identified

X-Force has identified a new squatting campaign used by threat actors to target the media sector. The campaign has a

Read more

BLINDINGCAN Remote Access Trojan [HIDDEN COBRA]

The FBI has high confidence that HIDDEN COBRA actors are using malware variants in conjunction with proxy servers to maintain

Read more

Joint NSA and FBI Cybersecurity Advisory Discloses Russian Malware Drovorub

The Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS), military unit 26165, is deploying previously

Read more

Phishing Emails Used to Deploy KONNI Malware

KONNI malware is often delivered via phishing emails as a Microsoft Word document with a malicious VBA macro code. The

Read more

Fake Security Advisory used in cPanel Phishing Attack

BleepingComputer has analyzed a targeted phishing campaign being reported by cPanel users. The phishing email has a subject line of

Read more

New version of Chinese malware named Taidoor has been discovered

This discovery is the result of analytic efforts between the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of

Read more
%d bloggers like this: