General

Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes​

Cybersecurity researchers have alerted to a new malvertising campaign that’s targeting individuals and businesses advertising via Google Ads by attempting to phish for their credentials via fraudulent ads on Google.
“The scheme consists of stealing as many advertiser accounts as possible by impersonating Google Ads and redirecting victims to fake login pages,” Jérôme Segura, senior director of

Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes​ Read Post »

Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99​

The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that targeted software developers looking for freelance Web3 and cryptocurrency work to deliver malware.
“The campaign begins with fake recruiters, posing on platforms like LinkedIn, luring developers with project tests and code reviews,” Ryan Sherstobitoff, senior vice president of Threat

Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99​ Read Post »

North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains​

Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes and a 2016 crowdfunding scam.
The new evidence suggests that Pyongyang-based threamoret groups may have pulled off illicit money-making scams that predate the use of IT workers, SecureWorks Counter Threat Unit (CTU) said in a report shared with The Hacker

North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains​ Read Post »

Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool​

As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix systems, some of which could be exploited to execute arbitrary code on a client.
“Attackers can take control of a malicious server and read/write arbitrary files of any connected client,” the CERT Coordination Center (CERT/CC) said in an advisory. “Sensitive data, such as SSH keys,

Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool​ Read Post »

The High-Stakes Disconnect For ICS/OT Security​

Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with an IT security playbook isn’t just ineffective—it’s high risk.
In the rapidly evolving domain of cybersecurity, the specific challenges and needs for Industrial Control Systems (ICS) and Operational Technology (OT) security distinctly stand out from traditional IT security. ICS/OT

The High-Stakes Disconnect For ICS/OT Security​ Read Post »

Scroll to Top