In the HubPhish exploits, there have been sophisticated phishing attacks targeting Microsoft Azure accounts are becoming a major concern for businesses worldwide, especially in Europe. A recent phishing …
Penelope Iroko
-
-
News & ResourcesRansomware
The Mask APT Malware Campaign Resurfaces with Sophisticated Multi-Platform Malware Arsenal
by Penelope Iroko 2 minutes readCybersecurity threats are evolving, and “The Mask APT Malware Campaign” is one of the most sophisticated examples of modern cyber espionage. Known for targeting high-profile organizations, The Mask …
-
News & ResourcesRansomware
Cleo Ransomware Vulnerability Exploited by Cl0p Group: What You Need to Know
by Penelope Iroko 2 minutes readThe Cleo ransomware vulnerability exploited by the notorious Cl0p group has raised alarms across the cybersecurity community, revealing critical flaws in Cleo’s Harmony, VLTrader, and LexiCom tools. This …
-
News & Resources
Citrix Issues Alert on Password-Spraying Attacks on NetScaler
by Penelope Iroko 2 minutes readCybersecurity giant Citrix has sounded the alarm about password-spraying attacks on NetScaler and NetScaler Gateway appliances. These attacks are part of a growing trend targeting critical systems worldwide, …
-
CyberSecurity Basics
SRP Federal Credit Union Ransomware Attack Exposes 240,000 Records
by Penelope Iroko 2 minutes readThe SRP Federal Credit Union ransomware attack has left over 240,000 individuals vulnerable after cybercriminals stole sensitive personal information, including Social Security numbers, financial data, and driver’s license …
-
News & Resources
390,000+ WordPress Credentials Stolen via Malicious GitHub Repository
by Penelope Iroko 2 minutes readWordPress Credentials Stolen via GitHub Exploit: A Widespread Cybersecurity Threat – A shocking cybersecurity revelation has emerged: over 390,000 WordPress credentials have been stolen through a malicious GitHub …
-
News & ResourcesCloud Security
Critical Vulnerabilities in Ruijie Reyee Cloud Platform Discovered
by Penelope Iroko 2 minutes readRecent findings have revealed critical vulnerabilities in Ruijie Reyee devices, posing significant cybersecurity risks to tens of thousands of users globally. Researchers from cybersecurity firm Claroty have identified …
-
News & ResourcesCryptocurrency
Byte Federal Bitcoin ATM Data Breach: 58,000 Impacted
by Penelope Iroko 2 minutes readThe Byte Federal Bitcoin ATM Data Breach has raised significant concerns among cryptocurrency users after personal information belonging to 58,000 individuals was potentially exposed. The breach occurred when …
-
News & Resources
Iranian Hackers Target U.S. and Israel with IOCONTROL Malware: Key Insights
by Penelope Iroko 2 minutes readThe Iranian threat group CyberAv3ngers has been using custom-built malware called IOCONTROL malware to target critical IoT (Internet of Things) and OT (Operational Technology) devices in both the …
-
News & Resources
North Korean IT infiltration Techniques Pose Serious Threat to U.S. Businesses, DOJ Warns
by Penelope Iroko 2 minutes readBased on North Korean IT infiltration techniques, Cybersecurity experts and government officials are raising serious alarms following the indictment of 14 North Korean nationals by the U.S. Department …