Spear-Phishing Campaigns Target Russian, Belarusian Groups

As per recent reports, various Russian and Belarusian organizations have been targets of spear-phishing campaigns. These organizations belong to the non-profit, media, and international government sectors. Threat actors who orchestrated these spear-phishing ...
Office Worker

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks

Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...

BunnyLoader Malware: Modular Features Help Evade Detection

In the ever-evolving landscape of cybersecurity threats, a new variant of malware has emerged, posing significant challenges for detection and mitigation efforts. Known as BunnyLoader malware, it has recently undergone a transformation, ...

Russian Hackers Target Ukraine Via A Disinformation Campaign

Disinformation campaigns play an important role in cyber warfare, and this is exactly what Russian hackers target Ukraine. After waging war on Ukraine on land, Russia is attacking the East European country ...
identity, privileges, cyberattacks ransomware

Credential Harvesting Vs. Credential Stuffing Attacks: What’s the Difference?

Credential stuffing and harvesting, although similar, have nuanced differences particularly in how credentials are stolen, acquired and used ...
Security Boulevard
privileged, accounts

A Policy of All Privileged Accounts – Overkill or Common Sense?

An attacker accessing a privileged account doesn’t begin with a root or administrator account. An attack on a privileged account usually starts with the theft of an average user’s credentials. Passwords are ...
Security Boulevard

Application Security Check Up