credential harvesting
Spear-Phishing Campaigns Target Russian, Belarusian Groups
Wajahat Raja | | COLDRIVER Threat Actor, COLDWASTREL Threat Cluster, credential harvesting, Cybersecurity News, Russian Cyber Attacks, Social Engineering Tactics
As per recent reports, various Russian and Belarusian organizations have been targets of spear-phishing campaigns. These organizations belong to the non-profit, media, and international government sectors. Threat actors who orchestrated these spear-phishing ...
Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Barry Strauss | | breaches, Cloud Email Security, credential harvesting, credential stealing, CTO Corner, Email Protection, generative AI, Phishing, Phishing Attacks, social engineering attacks, threat detection
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...
APT28 HeadLace Malware Targeting European Networks Unveiled
Wajahat Raja | | Advanced Persistent Threats (APT), APT28, BlueDelta, credential harvesting, cyber defense, Cyber Espionage, cyber warfare, Cybersecurity News, cybersecurity threats, European Networks, Fancy Bear, Geofencing Malware, HeadLace Malware, Iron Twilight, LOLbins, Nation State Cyberattacks, Network Security, Russian GRU, spear-phishing, state-sponsored-hacking, Ukraine Cyber Attacks
In recent months, a series of cyber onslaughts have shaken networks across Europe, with the insidious HeadLace malware at the heart of the storm. This malevolent software, attributed to the Russian GRU-backed ...
BunnyLoader Malware: Modular Features Help Evade Detection
Wajahat Raja | | BunnyLoader malware, credential harvesting, cryptocurrency theft, Cybercrime Trends, Cybersecurity News, cybersecurity threats, data theft, Infection chains, Malware Analysis, Malware Detection, Malware evasion tactics, Malware Evolution, Modular malware, Palo Alto Networks Unit 42
In the ever-evolving landscape of cybersecurity threats, a new variant of malware has emerged, posing significant challenges for detection and mitigation efforts. Known as BunnyLoader malware, it has recently undergone a transformation, ...
Russian Hackers Target Ukraine Via A Disinformation Campaign
Wajahat Raja | | Alexei Navalny, Callisto Group, COLDRIVER, credential harvesting, cyber warfare, Cybersecurity Measures, Cybersecurity News, disinformation campaign, ESET, Kyivstar, Microsoft, Operation Texonto, phishing campaign, Russian hackers, The Hacker News, The Record, Ukraine, Vladimir Putin
Disinformation campaigns play an important role in cyber warfare, and this is exactly what Russian hackers target Ukraine. After waging war on Ukraine on land, Russia is attacking the East European country ...
Credential Harvesting Vs. Credential Stuffing Attacks: What’s the Difference?
Credential stuffing and harvesting, although similar, have nuanced differences particularly in how credentials are stolen, acquired and used ...
Security Boulevard
Massive ‘New’ Leaked Credentials List: Naz.API Pwns Troy
Richi Jennings | | authentication credentials, Compromised Credential, compromised credentials, compromised credentials monitoring, credential, Credential Compromise, credential database, Credential Dumping, credential harvesting, credential hijacking, credential loss, Credential Monitoring, credential stealing, credential stuffing, credential stuffing attack, Credential Stuffing Attacks, credentialstuffing, haveibeenpwned, HaveIBeenPwned.com, HIBPwned, info stealer, information stealer, infostealer, infostealers, malicious apps that steal passwords, Naz.API, password stuffing, SB Blogwatch, stuffingattacks, Troy Hunt
Have I been pwned? Yes, you probably have. Stop reusing passwords, already. Here’s what else you should do ...
Security Boulevard
A Policy of All Privileged Accounts – Overkill or Common Sense?
An attacker accessing a privileged account doesn’t begin with a root or administrator account. An attack on a privileged account usually starts with the theft of an average user’s credentials. Passwords are ...
Security Boulevard