• Essential Settings to Maximize Your Microsoft 365 Experience 

    Essential Settings to Maximize Your Microsoft 365 Experience 

    Microsoft 365 is a powerful suite of tools. It helps to enhance productivity and collaboration. This is especially true for small to mid-sized businesses (SMBs). But to get the most out of Microsoft 365, it’s important to optimize its settings. Otherwise, you may only be using a fraction of the power you have. Ready to…

    Read More

  • Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant

    Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant

    The Russian threat actor known as RomCom has been linked to a new wave of cyber attacks aimed at Ukrainian government agencies and unknown Polish entities since at least late 2023. The intrusions are characterized by the use of a variant of the RomCom RAT dubbed SingleCamper (aka SnipBot or RomCom 5.0), said Cisco Talos,…

    Read More

  • Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program

    Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program

    Cybersecurity researchers have gleaned additional insights into a nascent ransomware-as-a-service (RaaS) called Cicada3301 after successfully gaining access to the group’s affiliate panel on the dark web. Singapore-headquartered Group-IB said it contacted the threat actor behind the Cicada3301 persona on the RAMP cybercrime forum via the Tox messaging service after the latter put out an

    Read More

  • 5 Ways to Reduce SaaS Security Risks

    5 Ways to Reduce SaaS Security Risks

    As technology adoption has shifted to be employee-led, just in time, and from any location or device, IT and security teams have found themselves contending with an ever-sprawling SaaS attack surface, much of which is often unknown or unmanaged. This greatly increases the risk of identity-based threats, and according to a recent report from CrowdStrike,…

    Read More

  • SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack

    SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack

    An advanced persistent threat (APT) actor with suspected ties to India has sprung forth with a flurry of attacks against high-profile entities and strategic infrastructures in the Middle East and Africa. The activity has been attributed to a group tracked as SideWinder, which is also known as APT-C-17, Baby Elephant, Hardcore Nationalist, Leafperforator, Rattlesnake, Razor…

    Read More

  • U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks

    U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks

    Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denial-of-service (DDoS) botnet for hire that conducted a record 35,000 DDoS attacks in a single year, including those that targeted Microsoft’s services in June 2023. The attacks, which were facilitated by Anonymous Sudan’s “powerful DDoS tool,” singled out critical infrastructure, corporate…

    Read More

  • Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity

    Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity

    Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint detection and response (EDR) solutions and hide malicious activity. Trend Micro said it detected “threat actors attempting to integrate EDRSilencer in their attacks, repurposing it as a means of evading detection.” EDRSilencer, inspired by the NightHawk FireBlock tool…

    Read More

  • FIDO Alliance Drafts New Protocol to Simplify Passkey Transfers Across Different Platforms

    FIDO Alliance Drafts New Protocol to Simplify Passkey Transfers Across Different Platforms

    The FIDO Alliance said it’s working to make passkeys and other credentials more easier to export across different providers and improve credential provider interoperability, as more than 12 billion online accounts become accessible with the passwordless sign-in method. To that end, the alliance said it has published a draft for a new set of specifications…

    Read More

  • From Misuse to Abuse: AI Risks and Attacks

    From Misuse to Abuse: AI Risks and Attacks

    AI from the attacker’s perspective: See how cybercriminals are leveraging AI and exploiting its vulnerabilities to compromise systems, users, and even other AI applications Cybercriminals and AI: The Reality vs. Hype “AI will not replace humans in the near future. But humans who know how to use AI are going to replace those humans who…

    Read More

  • North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware

    North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware

    The North Korean threat actor known as ScarCruft has been linked to the zero-day exploitation of a now-patched security flaw in Windows to infect devices with malware known as RokRAT. The vulnerability in question is CVE-2024-38178 (CVSS score: 7.5), a memory corruption bug in the Scripting Engine that could result in remote code execution when…

    Read More