Your partner “is cheating on you” scam asks you to pay to see proof
Scammers are now throwing in the name of the partner of the targeted victim, telling them that their partner is cheating on them.
Read moreScammers are now throwing in the name of the partner of the targeted victim, telling them that their partner is cheating on them.
Read moreCredit to Author: Nicolas Pommier| Date: Tue, 20 Aug 2024 15:03:08 +0000
Le groupe de ransomware “Mad Liberator” s’appuie sur des techniques d’ingénierie sociale pour scruter son environnement.
Read moreThis week on the Lock and Code podcast, we speak with Eva Galperin about the arrest of Telegram’s CEO and how it impacts security and privacy.
Read moreCredit to Author: Microsoft Threat Intelligence and Microsoft Security Response Center (MSRC)| Date: Fri, 30 Aug 2024 16:00:00 +0000
Microsoft identified a North Korean threat actor exploiting a zero-day vulnerability in Chromium (CVE-2024-7971) to gain remote code execution (RCE) in the Chromium renderer process. Our assessment of ongoing analysis and observed infrastructure attributes this activity to Citrine Sleet, a North Korean threat actor that commonly targets the cryptocurrency sector for financial gain.
The post North Korean threat actor Citrine Sleet exploiting Chromium zero-day appeared first on Microsoft Security Blog.
Read moreCredit to Author: Microsoft Incident Response| Date: Wed, 28 Aug 2024 19:00:00 +0000
In this blog post, read how Microsoft Incident Response leverages three types of threat intelligence to enhance incident response scenarios.
The post The art and science behind Microsoft threat hunting: Part 3 appeared first on Microsoft Security Blog.
Read moreCriminals are impersonating MyLowesLife, Lowes’ HR portal for current and former employees.
Read moreCredit to Author: Microsoft Threat Intelligence| Date: Wed, 28 Aug 2024 15:00:00 +0000
Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which we named Tickler. Tickler has been used in attacks against targets in the satellite, communications equipment, oil and gas, as well as federal and state government sectors in the United States and the United Arab […]
The post Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations appeared first on Microsoft Security Blog.
Read moreIntermountain Planned Parenthood of Montana suffered a cyberattack which has been claimed by a ransomware group
Read more” Hello pervert” sextortion mails keep adding new features to their email to increase credibility and urge victims to pay
Read more