Dec 12, 2024 | Podcast
https://cloud.google.com/blog/topics/threat-intelligence/c2-browser-isolation-environments A new technique discovered by Mandiant demonstrates how cybercriminals are finding innovative ways to circumvent security measures. The technique involves using QR codes to...
Dec 11, 2024 | Podcast
https://www.bleepingcomputer.com/news/security/wpforms-bug-allows-stripe-refunds-on-millions-of-wordpress-sites A critical security vulnerability has been discovered in WPForms, a popular form builder plugin used by over 6 million WordPress websites. The flaw,...
Dec 10, 2024 | Podcast
https://www.cadosecurity.com/blog/meeten-malware-threat A new phishing campaign is targeting individuals working in the Web3 industry, using fake video conferencing apps to deliver malicious software. How the Scam Works: Fake Company Outreach: Threat actors create...
Dec 9, 2024 | Podcast
https://www.vpnmentor.com/news/shiny-nemesis-report A recent cyberattack, believed to be linked to the ShinyHunters group, has exposed the vulnerabilities of misconfigured AWS environments. The attackers exploited exposed AWS credentials to gain unauthorized access to...
Dec 7, 2024 | Podcast
https://www.bleepingcomputer.com/news/security/new-rockstar-2fa-phishing-service-targets-microsoft-365-accounts A new phishing-as-a-service (PhaaS) platform, known as Rockstar 2FA, has emerged, enabling cybercriminals to launch sophisticated phishing attacks targeting...
Dec 6, 2024 | Podcast
https://www.cloudflare.com/es-la/threat-intelligence/research/report/sacked-or-hacked-unmasking-employment-termination-scams A new phishing campaign is targeting individuals with a fear-inducing tactic: a fake legal notice claiming job termination. How the Scam Works:...