Microsoft has shared a detailed report of the SEABORGIUM threat actor that has been impersonating social connections to target individuals to steal credentials and eavesdrop on all communications and attachments. This article looks into SEABORGIUM, its attack tactics, theft patterns, and how you can protect against the SEABORGIUM campaign.
There are sophisticated smishing schemes threat actors have started leveraging these days; that is how Twilio described the successful smishing attack that targeted its employees on August 4, 2022. Read on to know how attackers targeted the programmable communication tools provider and stole employee credentials.
Cyberattacks are an everyday struggle, and to stay ahead of the latest attack vectors, we must be updated on the latest security loopholes and patches. To help you stay abreast of the latest cybersecurity happenings, here are this week’s major cyber news headlines:
Volexity’s cybersecurity researchers have revealed mass exploitation of Zimbra Collaboration’s mail server due to a zero-day vulnerability with the previously discovered RCE exploit. Here is how the Zimba hack took place, how many were affected worldwide, how the Zimba hack works, and how you can keep yourself safe.
Cybersecurity headlines this week cover some of the major global security updates. You cannot miss catching up on these, as your next major security move might be suggested in one of these updates. Here are this week’s major cybersecurity updates for your perusal:
Microsoft has discovered a PSOA, a cyber mercenary organization with sophisticated hiring tools that can allow threat actors to exploit Windows and Adobe vulnerabilities for malicious activities. This article looks at KNOTWEED, the identified threat, what it is, how KNOTWEED works, and how you can identify and protect yourself from KNOTWEED.(more…)
Cybersecurity incidents have increased significantly; therefore, regulatory bodies are working religiously towards releasing patches on time. This week’s cyber news headlines cover some of the important developments that have taken place over the last week.
Email scams continue to pose significant risks to online data, finances, and accounts. This article discusses the elements involved, the top email scams of the year, and the practices that cybercriminals are using for evolved email scams. It also shares key statistics for email and phishing scams and how to avoid all email scams.
The cybersecurity landscape continues to evolve rapidly, with threat actors evolving their modus operandi every week to target individuals and organizations worldwide. Here are the latest cybersecurity headlines to follow this week:
In 193 AD, the royal guard killed the Roman emperor. Thenthe empire was auctioned off to one Didius Julianus in 193 AD. Julianus had paid somewhere around $1 billion in today’s money. Unfortunately, the guards had scammed Julianus by selling something that didn’t belong to them. Julianus was emperor for a few weeks before he was overthrown.(more…)