Category: security

European Space Agency hack sees official store hijacked to steal customer details

Security researchers found a malicious script on ESA’s web shop The script creates a fake Stripe page at checkout, grabbing payment data The shop is currently unavailable The website of the European Space Agency (ESA) was recently compromised with a credit card skimmer, putting countless people at risk of wire…

Read More

Dark Web cybercriminals are buying up ID to bypass KYC methods

Researchers from iProov found a group buying up ID data from consumers The data is being used to bypass KYC processes Companies will need to go for a multi-layered approach, iProov says Hackers have found an easy and simple way to grab people’s sensitive information, and then use it to…

Read More

Hackers are using Russian domains to launch complex document-based phishing attacks

Data exfiltration tactics are shifting toward Russian domains Remote Access Trojans see a 59% rise in phishing emails Malicious emails now bypass secure gateways every 45 seconds New research has found there is a significant increase in malicious email activity as well as a shift in attack strategies. On average,…

Read More

Interlock ransomware attacks highlight need for greater security standards on critical infrastructure

Standing privilege can be minimized using the zero trust principle Critical servers can be protected by enabling just-in-time access FreeBSD jails can help to isolate workloads and enhance defense A recently discovered ransomware group has been observed targeting organizations with a focus on FreeBSD servers. Launched in late September 2024,…

Read More

This devious two-step phishing campaign uses Microsoft tools to bypass email security

Two-step phishing evades security with user-triggered actions Fake Microsoft portals harvest sensitive login credentials fast Advanced threat detection is key to fighting phishing A two-step phishing attack is leveraging Microsoft Visio files (.vsdx) and SharePoint, marking a new chapter in cyber deception, experts have warned. Perception Point’s security researchers reported…

Read More

Hackers are tricking victims into scam-yourself attacks with fake tutorials, CAPTCHAs, and updates

AI continues to play a dual role in cybersecurity Lumma Stealer rises 1154%, marking a new malware peak Outdated systems remain vulnerable to ransomware In its recent Q3 2024 Threat Report, Gen highlights alarming trends that reveal the rising complexity of cyber threats, highlighting that as cybercriminals refine their methods,…

Read More