Tag: Abuses

Ransomware abuses Amazon AWS function to encrypt S3 buckets

A brand new ransomware marketing campaign encrypts Amazon S3 buckets utilizing AWS's Server-Facet Encryption with Buyer Offered Keys (SSE-C) identified solely...

UAC-0125 Abuses Cloudflare Staff to Distribute Malware Disguised as Military+ App

î ‚Dec 19, 2024î „Ravie LakshmananDisinformation / Malware The Laptop Emergency Response Group of Ukraine (CERT-UA) has disclosed {that a} risk actor it tracks as UAC-0125 is...

Ongoing phishing assault abuses Google Calendar to bypass spam filters

An ongoing phishing rip-off is abusing Google Calendar invitations and Google Drawings pages to steal credentials whereas bypassing spam filters. Based on...

New Ghost Faucet assault abuses NFC cell funds to steal cash

Cybercriminals have devised a novel methodology to money out from stolen bank card particulars linked to cell fee methods corresponding to...

RansomHub ransomware abuses Kaspersky TDSSKiller to disable EDR software program

The RansomHub ransomware gang has been utilizing TDSSKiller, a reliable device from Kaspersky, to disable endpoint detection and response (EDR) companies on course programs. After...

New Voldemort malware abuses Google Sheets to retailer stolen information

A brand new malware marketing campaign is spreading a beforehand undocumented backdoor named "Voldemort" to organizations worldwide, impersonating tax companies from the U.S., Europe,...
spot_imgspot_img

Subscribe

Popular articles

U.S. Sanctions Chinese language Cybersecurity Agency Over Treasury Hack Tied to Silk Hurricane

The U.S. Treasury Division's Workplace of International Property Management...

FTC cracks down on Genshin Impression gacha loot field practices

Genshin Impression developer Cognosphere (aka Hoyoverse)...

New ‘Sneaky 2FA’ Phishing Package Targets Microsoft 365 Accounts with 2FA Code Bypass

î ‚Jan 17, 2025î „Ravie LakshmananCybersecurity / Menace Intelligence Cybersecurity researchers have...