Category

Executive Monitoring

Executive Monitoring Page 1

Phishing Operator California Online Scam US DoD Fraud Prevention DNS Intelligence

A phishing operator from California scammed the US DoD with $23.5M

A California resident phishing operator named Sercan Oyuntur has been indicted by the US Department of Justice (DoJ) for its malicious campaigns causing the US Department of Defense (DoD) to lose over $23.5 million in damages. The money swindled from the US DoD was meant for funding a jet fuel supplier. However, the phishing operator...
Continue Reading
AridViper APT Israeli Officials Cyberattack Campaign Operation Bearded Barbie Social Engineering

AridViper APT observed targeting Israeli officials in a new campaign

A new cyberespionage campaign carried out by the APT-C-23, also known as the AridViper APT group, has been observed by security experts, wherein high-ranking Israeli officials are being targeted. The advanced persistent threat (APT) group is a politically driven attack operator based in the Middle East and also goes by Desert Falcon and Two-tailed Scorpion....
Continue Reading
Threat Actors Short-Lived Malware Industrial Companies Industry Data Exfiltration Spear-Phishing Phishing Attack

Threat actors used short-lived malware to target industrial companies

Researchers revealed that malicious threat actors abuse short-lived malware to terrorize numerous industrial companies worldwide. The malware seeks corporate credentials and data to steal and sell it to other malicious entities for money. The researchers analysed the short-lived malware samples discovered in the first half of last year. About 21.2% of these malware samples were...
Continue Reading
DazzleSpy Cyberattack Campaign Hong Kong Politicians Pro Democracy Spyware Surveillance

DazzleSpy conducts an attack campaign against Hong Kong politicians

A cyberespionage campaign called DazzleSpy has recently been identified infecting macOS by exploiting a Safari browser’s flaw through a watering hole attack. Based on reports, the threat actors conducted the campaign to target Hong Kong-based politicians and are equipped with over-the-top technical capabilities. The threat actors targeted a legitimate website of a pro-democracy internet radio...
Continue Reading
vendor supply chain knowledge gap third-party risk assessment

Third-party cyber risk, The vendor supply chain knowledge gap

The recent SolarWinds cyberattack exposed a third-party supply chain weakness using exploitable vulnerabilities on other widely distributed and implemented software and system offerings available in the market. Still, many enterprises have little insight into the set of suppliers currently being used in their infrastructure systems. Based on a survey conducted by BlueVoyant, out of 1,500...
Continue Reading
Zerologon Vulnerability APT10 hackers hacking group

APT10 targeting businesses on a global scale using Zerologon Vulnerability

A widespread and highly persistent cyber-attack has been discovered by security researchers. The series of assaults conducted by APT10 hacking group were found to have been leveraging the Zerologon vulnerability of Windows, targeting mostly Japanese firms but has connections to attacks happening in more than 17 territories around the world. No particular industry was targeted,...
Continue Reading
operation falcon BEC phishing threat actors antiphishing spear-phishing fraud prevention Nigeria

Operation Falcon: BEC Phishing Threat Actors Detained!

Three Nigerian nationals that are ostensibly pointed out as the Threat actors behind a malware distribution for phishing and other scams worldwide lead the joint force of INTERPOL, Nigeria Police Force cybercrime investigation, and Group-IB for their Operation Falcon in Lagos, Nigeria. There were reportedly 50,000 victims that were identified in an enormous Global Scam...
Continue Reading
iranian hackers apt charming kitten impersonation social engineering

Iranian APT group Charming Kitten impersonates journalists

After few months working under the radar, cybersecurity experts again have unraveled the repurposed modus of the Iranian APT group dubbed as Charming Kitten. Their main targets are usually to perform cyber espionage to victims from the United States, Israel, and other countries who typically are prominent people from being an activist, entrepreneurs, government, and...
Continue Reading
crackers perpetrators bruteforce attack password cracking gatecrash zoom meetings password threshold

Crackers gatecrash on Zoom meetings

With their regular website and app scanning, Cybersecurity researcher spotted an unusual patch released by Zoom Company. Zoom is a popular application that is usually used for voice and video conferencing by many prominent businesses worldwide. The in-depth analysis confirmed that the patch was their resolution to the recently discovered vulnerability of the application. The...
Continue Reading
twitter high profile account hijacked cryptocurrency scam social engineering

High Profile Twitter accounts hijacked to promote Cryptocurrency Scam

Multiple high-profile and verified Twitter accounts were hacked on Wednesday by Cybercriminals that used the official accounts to spread a Cryptocurrency scam. The post lures the followers of high-profile accounts to send payment to a BTC Address within 30 minutes and “as payback” they will have the money back double in value – a common...
Continue Reading
1 2