Scattered Spider’s Newest Targets: Transportation and Airlines
Scattered Spider is evolving tactics and targeting new sectors.
Scattered Spider is evolving tactics and targeting new sectors.
The Russian nation-state threat actor known as Secret Blizzard has been observed orchestrating a new cyber espionage campaign targeting foreign embassies located in Moscow by means of an adversary-in-the-middle (AitM) attack at the Internet Service Provider (ISP) level and delivering a custom malware dubbed ApolloShadow. “ApolloShadow has the capability toRead More »Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies
Cybersecurity researchers have disclosed details of a new phishing campaign that conceals malicious payloads by abusing link wrapping services from Proofpoint and Intermedia to bypass defenses. “Link wrapping is designed by vendors like Proofpoint to protect users by routing all clicked URLs through a scanning service, allowing them to blockRead More »Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials
Noma Security has announced a Series B funding round that will enable the company’s growth and expansion of its AI agent security solutions. The post Noma Security Raises $100 Million for AI Security Platform appeared first on SecurityWeek.
Chinese military and cyber researchers are intensifying efforts to counter Elon Musk’s Starlink satellite network, viewing it as a potential tool for U.S. military power across nuclear, space, and cyber domains. The post Chinese Researchers Suggest Lasers and Sabotage to Counter Musk’s Starlink Satellites appeared first on SecurityWeek.
Reach Security has received a $10 million strategic investment from M12 to advance its domain-specific AI approach for exposure management. The post Reach Security Raises $10 Million for Exposure Management Solution appeared first on SecurityWeek.
The tool includes resources to help organizations during the containment and eviction stages of incident response. The post Open Source CISA Tool Helps Defenders With Hacker Containment, Eviction appeared first on SecurityWeek.
The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting two different organizations by approaching their employees via LinkedIn and Telegram. “Under the guise of freelance opportunities for software development work, UNC4899 leveraged social engineering techniques to successfully convince the targeted employees to execute malicious DockerRead More »N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto
Why context, behavioral baselines, and multi-source visibility are the new pillars of identity security in a world where credentials alone no longer cut it. The post Who’s Really Behind the Mask? Combatting Identity Fraud appeared first on SecurityWeek.
1 in 20 online identity verification attempts are fraudulent in the financial services sector.