admin

Kiberni kriminalci izkoriščajo Microsoft Sway za krajo vaših prijavnih podatkov.

Phishing kampanje, ki ciljajo na poverilnice MS Office, so julija 2024 doživele znaten porast, izkoriščajoč Microsoft Sway za dostavo zlonamernih QR kod, kjer napadalci uporabljajo transparenten phishing in Cloudflare Turnstile, da se izognejo odkrivanju in zaobidejo varnostne ukrepe. QR kode preusmerjajo uporabnike na phishing strani, pogosto z uporabo mobilnih naprav zaradi njihove potencialne pomanjkljive varnosti,…

Read More

AI Unveils Cybercriminals Leveraging Google Sheets for Malware Command in Massive Espionage Operation

Clever Use of Google Sheets in Malware Campaign In a recent discovery by cybersecurity researchers, a new malware campaign has been unearthed, utilizing an unconventional tactic of using Google Sheets as a command-and-control mechanism. This innovative approach showcases the evolving techniques employed by cybercriminals to evade detection and carry out their malicious activities. Impersonation of…

Read More

Iranian Hackers Launch Cyber Attack on U.S. Political Campaigns

Cybersecurity Researchers Uncover Iranian Threat Actors’ Network Infrastructure Cybersecurity researchers at Recorded Future’s Insikt Group recently made a significant discovery in the realm of online security. They stumbled upon a new network infrastructure established by Iranian threat actors aimed at aiding activities connected to the recent targeting of U.S. political campaigns. Uncovering GreenCharlie: The Insikt…

Read More

Unmasking the Latest Malware: Palo Alto VPN Impersonator Preying on Middle East Users

Cybersecurity Researchers Uncover Malware Targeting Users in the Middle East In a recent discovery, cybersecurity researchers have unveiled a new campaign aimed at users in the Middle East. The attack involves malware that masquerades as the Palo Alto Networks GlobalProtect virtual private network (VPN) tool. This deceptive tactic is designed to lure unsuspecting users into…

Read More

Beware: North Korean Cyber Attack Targets Developers with Malicious npm Packages

Threat Actors from North Korea Target Developers with Malware on npm Registry Threat actors associated with North Korea have once again flexed their malicious cyber prowess by uploading a series of malevolent packages to the popular npm registry. These actions highlight a worrisome trend of coordinated and persistent efforts to infiltrate developers’ systems, inject malware,…

Read More

Atlassian Confluence Vulnerability: How Hackers Are Using It for Crypto Mining

The Confluence Data Center and Server Vulnerability Exploitation for Cryptocurrency Mining In a concerning turn of events, threat actors have been capitalizing on a critical security flaw in Atlassian’s Confluence Data Center and Confluence Server. Although the vulnerability has been patched, malicious actors have been exploiting it to engage in unauthorized cryptocurrency mining activities on…

Read More

Defending Against the Latest Cyber Threat Targeting Chinese-Speaking Businesses

Chinese-Speaking Users Targeted in Sophisticated Cyber Attack Campaign In a recent study by Securonix researchers Den Iuzvyk and Tim Peck, it was revealed that Chinese-speaking users have become the targets of a highly organized and sophisticated cyber attack campaign. The attackers behind this campaign are using phishing emails as a means to infect Windows systems…

Read More

8 aplikacij za Android in iOS, ki so izpostavile puščanje občutljivih podatkov

Osem aplikacij za Android in iOS predstavlja pomembno varnostno tveganje Osem aplikacij za Android in iOS predstavlja pomembno varnostno tveganje za uporabnike zaradi njihovega neuspeha pri šifriranju občutljivih podatkov med prenosom. Ugotovljeno je bilo, da pošiljajo nešifrirane informacije, kot so podrobnosti o napravi, podatki o lokaciji in prijavni podatki, prek protokola HTTP namesto varnejšega protokola…

Read More