Incredulous as it may seem, you are about to uncover the intricate workings of a new AiTM Phishing-as-a-Service known as Sneaky 2FA. This sophisticated toolkit, targeting Microsoft 365 …
Threats & Attacks
-
-
MalwareCryptocurrencyNation-StateNews
Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles
by CSC Newsby CSC News 2 minutes readThe Lazarus Group targets Web3 developers in a chilling new cyber campaign known as Operation 99. By posing as recruiters with fake LinkedIn profiles, North Korea’s state-sponsored hacking …
-
VulnerabilitiesNews
Critical Zoom Security Bulletin Highlights Multiple Vulnerabilities
by CSC Newsby CSC News 1 minutes readZoom has recently issued a critical Zoom security bulletin, shedding light on several vulnerabilities across its Workplace Apps for Linux, macOS, Windows, and other platforms. These issues, if …
-
VulnerabilitiesNews
Zyxel Improper Privilege Management Vulnerability Update
by Clement Brako Akomea 1 minutes readA critical Zyxel improper privilege management vulnerability has been identified in the web management interface of specific access points (APs) and security routers. This issue could allow unauthorized …
-
MalwareNews
Malvertising Scam on Google Ads Targets User Credentials and 2FA Codes
by CSC Newsby CSC News 2 minutes readMalvertising Scam on Google Ads: Malvertising, or malicious advertising, has become a significant cybersecurity threat, targeting users through Google Ads. Cybercriminals are creating fake ads that appear legitimate …
-
NewsMalware
FBI Eliminates PlugX Malware from Over 4,250 Computers in Landmark Operation
by Penelope Iroko 2 minutes readThe FBI eliminates PlugX malware in a monumental effort, targeting over 4,250 compromised devices worldwide. This operation, conducted with court approval and international collaboration, highlights the growing threat …
-
VulnerabilitiesNews
Google Cloud Team Discovers Critical Rsync Vulnerabilities
by Clement Brako Akomea 2 minutes readGoogle Cloud researchers have identified critical Rsync vulnerabilities, exposing serious risks in the widely used file synchronization tool. Rsync, known for seamlessly syncing files across devices and servers, …
-
Phishing AttacksNews
PayPal Phishing Campaign Uses Genuine Links for Account Takeovers
by Clement Brako Akomea 2 minutes readA PayPal phishing campaign that uses genuine links to trick unsuspecting users into handing over their account credentials is causing havoc. Unlike traditional phishing methods, this campaign exploits …
-
Threats & AttacksNews
Confirmed: Ivanti Zero-Day Attacks on Connect Secure Products
by Clement Brako Akomea 2 minutes readIvanti Zero-Day Attacks have once again brought cybersecurity to the forefront as the company disclosed critical vulnerabilities affecting its Connect Secure products. These zero-day flaws, identified as CVE-2025-0282 …
-
NewsBusinessRansomware
Investigation Results of Casio Ransomware Attack and Information Leak
by Clement Brako Akomea 2 minutes readCasio Computer Co., Ltd. (Casio) has officially disclosed the detailed results of its investigation into a significant ransomware attack and information leak that compromised internal systems and sensitive …