The threat actor, also known as Goffee, has been active since at least 2022 and has changed its tactics and techniques over the years while […]
Financial Fraud, With a Third-Party Twist, Dominates Cyber Claims
The most damaging attacks continue to be ransomware, but financial fraud claims are more numerous — and both are driven by increasing third-party breaches. ​The […]
Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit
Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after the initial access vector used […]
Using Third-Party ID Providers Without Losing Zero Trust
With $4.4 billion in worldwide data breach fines in 2024, the cost of not knowing who’s walking into your systems is devastating. ​The original article […]
11 Bugs Found in Perplexity AI’s Chatbot Android App
Researchers characterize the company’s artificial intelligence chatbot as less secure than ChatGPT and even DeepSeek. ​The original article found on darkreading Read More
Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors
The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant called PowerModul. The activity, which took place […]
Organizations Lack Incident Response Plans, But Answers Are on the Way
Developing strong incident response plans remains an area that requires significant improvement. Here are some shortcomings and how to address them. ​The original article found […]
Initial Access Brokers Shift Tactics, Selling More for Less
What are IABs? Initial Access Brokers (IABs) specialize in gaining unauthorized entry into computer systems and networks, then selling that access to other cybercriminals. This […]
SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps
Cybersecurity researchers have found that threat actors are setting up deceptive websites hosted on newly registered domains to deliver a known Android malware called SpyNote. […]
Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways
Palo Alto Networks has revealed that it’s observing brute-force login attempts against PAN-OS GlobalProtect gateways, days after threat actors warned of a surge in suspicious […]