/Blog/

CyberheistNews Vol 14 #37 Scammers Use Fake Funeral LiveStream Social Media Posts to Extort Victims

By |2024-09-10T08:00:00-05:00September 10th, 2024|Security|Comments Off on CyberheistNews Vol 14 #37 Scammers Use Fake Funeral LiveStream Social Media Posts to Extort Victims

Phishing Attack Takes a Two-Step Approach to Leverage Legitimate Sites and Evade Detection

Analysis of a new phishing attack demonstrates how attackers may [...]

By |2024-09-06T15:32:14-05:00September 6th, 2024|Security|Comments Off on Phishing Attack Takes a Two-Step Approach to Leverage Legitimate Sites and Evade Detection

Manufacturing Sector Is the Latest Target of Advanced Credential Harvesting Attacks

A new attack runs slow and steady, focused on compromising [...]

By |2024-09-05T10:22:13-05:00September 5th, 2024|Security|Comments Off on Manufacturing Sector Is the Latest Target of Advanced Credential Harvesting Attacks

Organizations in the Middle East Targeted By Malware Impersonating Palo Alto GlobalProtect VPN

A social engineering campaign is targeting entities in the Middle [...]

By |2024-09-03T13:46:10-05:00September 3rd, 2024|Security|Comments Off on Organizations in the Middle East Targeted By Malware Impersonating Palo Alto GlobalProtect VPN