Hackers Using Domain Shadowing to Host Malicious Websites
Cybercriminals are increasingly using domain shadowing, a form of domain name system (DNS) hijacking, according to a new report from Palo Alto Networks Unit 42. Domain shadowing is…
Cybercriminals are increasingly using domain shadowing, a form of domain name system (DNS) hijacking, according to a new report from Palo Alto Networks Unit 42. Domain shadowing is…
Multi-Factor authentication provider Okta has identified a considerable increase in credential stuffing attacks on their users in their 2022 State of Secure Identity Report. In the first 90…
Do you believe in protecting organisations through cyber security? Who We Are The Scottish Business Resilience Centre (SBRC) is a not-for-profit organisation and a respected…
Description: Cyber security firm Proofpoint has identified a phishing campaign that uses the death of Queen Elizabeth II as a lure. Their threat insight team revealed that threat actors had created…
A zero-day (0-day) vulnerability refers to a security risk in a piece of software with no patches or mitigations to prevent cybercriminals from exploiting them….
Researchers at Artic Wolf Labs have published a report detailing that a threat actor has hacked a corporate phone system, Mitel’s MiVoice Business, to gain access to an…
In recent years, cryptocurrency has seen a massive rise in attention and interest and, for the majority, acts as a legitimate method of payment or…
Researchers at a cyber security firm Resecurity have released a report outlining a new Phishing-as-a-service (PhaaS) platform advertised on the dark web. Named EvilProxy, the service allows…
Researchers at Check Point Research have uncovered malware disguised as multiple legitimate apps, including Google Translate and YouTube Music for Desktop. If downloaded, the malware waits for…