Email:

Phone No.

Whatsapp

Month: November 2021

Glitch Service Abused to Host Short-Lived Phishing Sites
Glitch Service Abused to Host Short-Lived Phishing Sites
Glitch Service Abused to Host Short-Lived Phishing Sites
Glitch Service Abused to Host Short-Lived Phishing Sites

Glitch Service Abused to Host Short-Lived Phishing Sites

Glitch Service Abused to Host Short-Lived Phishing Sites Phishing actors are now actively abusing the Glitch platform to host short-lived credential-stealing URLs for free while evading detection and takedowns. The recent campaigns are targeting employees at major corporations who work with the Middle East. Based on an analysis by the DomainTools research team, this phishing

North Korean Cyberspies Target Govt Officials with Custom Malware

North Korean Cyberspies Target Govt Officials with Custom Malware A state-sponsored North Korean threat actor tracked as TA406 was recently observed deploying custom info-stealing malware in espionage campaigns. The particular actor is attributed as one of several groups known as Kimsuky (aka Thallium). TA406has left traces of low-volume activity since 2018, primarily focusing on espionage, money-grabbing scams, and

FBI Warns of APT Group Exploiting FatPipe VPN Zero-day Since May

FBI Warns of APT Group Exploiting FatPipe VPN Zero-day Since May The Federal Bureau of Investigation (FBI) warned of an advanced persistent threat (APT) compromising FatPipe router clustering and load balancer products to breach targets’ networks. FatPipe is a Salt Lake City computer networking hardware firm headquartered specializing in WAN optimization solutions with many Fortune 1000 companies on its customer

RedCurl Corporate Espionage Hackers Resume Attacks with Updated Tools

RedCurl Corporate Espionage Hackers Resume Attacks with Updated Tools A crew of highly-skilled hackers specialized in corporate espionage has resumed activity, one of their victims this year being a large wholesale company in Russia. Tracked as RedCurl, the group attacked the Russian business twice this year, each time using carefully constructed spear-phishing emails with initial-stage

× Chat with us