A new banking trojan is seen in the UK evading antivirus detection
Intelligence received at the Scottish Business Resilience Centre is warning of a current and active banking trojan campaign seen in the UK and around the…
Intelligence received at the Scottish Business Resilience Centre is warning of a current and active banking trojan campaign seen in the UK and around the…
If you’ve ever had an account on a website affected by a data breach, then chances are your credentials may be used in credential-stuffing attacks….
Affected Systems: Microsoft Exchange Server 2013, Exchange Server 2016, and Exchange Server 2019 Description: Researchers at cybersecurity firm GTSC have discovered two new zero-day vulnerabilities affecting Microsoft Exchange Server 2013, 2016,…
Description: Ukraine’s Ministry of Defence has warned of Russian plans to conduct mass cyber attacks on critical infrastructure belonging to Ukraine and its allies. The article details…
Cybercriminals are increasingly using domain shadowing, a form of domain name system (DNS) hijacking, according to a new report from Palo Alto Networks Unit 42. Domain shadowing is…
Multi-Factor authentication provider Okta has identified a considerable increase in credential stuffing attacks on their users in their 2022 State of Secure Identity Report. In the first 90…
Description: Cyber security firm Proofpoint has identified a phishing campaign that uses the death of Queen Elizabeth II as a lure. Their threat insight team revealed that threat actors had created…
A zero-day (0-day) vulnerability refers to a security risk in a piece of software with no patches or mitigations to prevent cybercriminals from exploiting them….
Researchers at Artic Wolf Labs have published a report detailing that a threat actor has hacked a corporate phone system, Mitel’s MiVoice Business, to gain access to an…