The financially motivated threat cluster UNC6040, tracked by Google Threat Intelligence Group (GTIG), has been orchestrating a series of voice phishing (vishing) campaigns specifically aimed […]
Author: cyberbytes
Data hoarding can have financial and security consequences
End-of-life data management, be it deletion of what is no longer required, or data removal from hardware before it’s decommissioned, may not get the attention […]
Iranian APT ‘BladedFeline’ Hides in Network for 8 Years
ESET published research on the Iranian APT “BladedFeline,” which researchers believe is a subgroup of the cyber-espionage entity APT34. ​The original article found on darkreading […]
CISA Releases TTPs & IoCs for Play Ransomware That Hacked 900+ Orgs
The Cybersecurity and Infrastructure Security Agency (CISA), alongside the Federal Bureau of Investigation (FBI) and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), […]
Cisco Alerts Users to Critical ISE Vulnerability Exposing Sensitive Data
Cisco has issued a critical security advisory (Advisory ID: cisco-sa-ise-aws-static-cred-FPMjUcm7) for its Identity Services Engine (ISE) when deployed on major cloud platforms—Amazon Web Services (AWS), […]
Hackerangriff auf deutschen Pappspezialist Wellteam
126822068 Olivier Le Moal – shutterstock.com Laut einem Bericht der Regionalzeitung Westfalen-Blatt bemerkte die IT von Wellteam bereits am 23. Mai, dass Hacker in das […]
Critical Cisco Nexus Dashboard Vulnerability Lets Attackers Impersonate Managed Devices
Cisco has issued a high-severity security advisory (ID: cisco-sa-ndfc-shkv-snQJtjrp) regarding a critical SSH host key validation vulnerability in its Nexus Dashboard Fabric Controller (NDFC), tracked […]
Get out of the audit committee: Why CISOs need dedicated board time
Adequate time with the board is in short supply for CISOs and this restricted engagement is leaving organizations unprepared to fully understand and manage enterprise […]
Outlook Users Targeted by New HTML-Based Phishing Scheme
A recent phishing campaign has revealed a sophisticated technique that exploits Microsoft Outlook’s unique handling of HTML emails to conceal malicious links from corporate users. […]
U.S. Authorities Shut Down Major Dark Web Marketplace with 117,000 Users
In a blow to the cybercrime underworld, the U.S. Attorney’s Office for the Eastern District of Virginia announced the seizure of approximately 145 domains, spanning […]