- Details
- hackernews.com
March 18, 2023 hackernews.com published that the U.S. government agencies have released a joint cybersecurity advisory detailing the indicators of compromise (IoCs) and tactics, techniques, and procedures (TTPs) associated with the notorious LockBit 3.0 ransomware. The LockBit 3.0 ransomware operations function as a Ransomware-as-a-Service (RaaS) model and is a continuation of previous versions of the ransomware, LockBit 2.0, and LockBit...Read More.......
- Details
- thehackernews.com
March 17, 2023 thehackernews.com published that threat activity clusters affiliated with the Chinese and Russian cybercriminal ecosystems have been observed using a new piece of malware that's designed to load Cobalt Strike onto infected machines. Dubbed SILKLOADER by Finnish cybersecurity company WithSecure, the malware leverages DLL side-loading techniques to deliver commercial adversary simulation software...Read More.......
- Details
- bleepingcomputer.com
March 12, 2023 Bleepingcomputer.com published that a ransomware operation known as Medusa has begun to pick up steam in 2023, targeting corporate victims worldwide with million-dollar ransom demands.The Medusa operation started in June 2021 but had relatively low activity, with few victims. However, in 2023 the ransomware gang increased in activity and launched a 'Medusa Blog' used to leak data for victims who refused to pay a ransom.....Read More.......
- Details
- bleepingcomputer.com
March 11, 2023 Bleepingcomputer.com published that the Clop ransomware gang has begun extorting companies whose data was stolen using a zero-day vulnerability in the Fortra GoAnywhere MFT secure file-sharing solution.In February, the GoAnywhere MFT file transfer solution developers warned customers that a zero-day remote code execution vulnerability was being exploited on exposed administrative consoles....Read More.......
- Details
- thehackernews.com
March 14, 2023 thehackernews.com published that an open source adversary-in-the-middle (AiTM) phishing kit has found a number of takers in the cybercrime world for its ability to orchestrate attacks at scale.The Microsoft Threat Intelligence team is tracking the threat actor behind the development of the kit under its emerging moniker DEV-1101. An AiTM phishing attack typically involves a threat actor attempting to steal and intercept a target's password and session cookies by deploying a proxy server between the user and the website.....Read More..........
- 5G Scam: Do Not Provide OTP Sent To You, EFCC Warns Nigerians
- Microsoft OneNote Abuse for Malware Delivery Surges
- Microsoft launches new AI chat-powered Bing and Edge browser
- Over 12% of analyzed online stores expose private data, backups
- SYS01stealer: New Threat Using Facebook Ads to Target Critical Infrastructure Firms