Beware: New Phishing Campaign Exploits SharePoint Servers
In recent weeks, Scotland has seen a rise in sophisticated phishing attacks exploiting SharePoint servers to deceive unsuspecting victims. Attackers are using legitimate SharePoint servers…
In recent weeks, Scotland has seen a rise in sophisticated phishing attacks exploiting SharePoint servers to deceive unsuspecting victims. Attackers are using legitimate SharePoint servers…
The Trustwave Spider Labs team uncovered Tycoon Group’s Phishing-as-a-Service operation, offering advanced phishing tools via Telegram. This system is designed to sidestep Microsoft’s two-factor authentication,…
Current cyber security incidents involving SaaS platforms, such as Midnight Blizzard targeting Microsoft and the Cloudflare-Atlassian breach, have outlined the vital significance of safeguarding personal…
Incident Overview: A sophisticated Android Remote Access Trojan (RAT), named VajraSpy, has been identified within 12 applications, half of which were distributed through the official…
Ransomware attackers are once again using TeamViewer to get into the computer systems of organisations. They aim to gain initial access to endpoints and try…
Overview The widespread adoption of digital communication has created an environment where businesses and charities are increasingly reliant on online platforms such as Eventbrite to…
Hackers are taking advantage of a newly discovered weakness in a software product called SysAid, which companies use to manage their IT services. This vulnerability…
Overview Hackers are using fake Windows app packages to spread a new type of malware called GHOSTPULSE. The fake packages are for popular software like…
Overview Proofpoint, a cyber security company, has been keeping a close eye on some threat actors that are targeting everyday businesses. These threats come in…