Infosecurity News
TA577 Exploits NTLM Authentication Vulnerability
Proofpoint warned the method could be used for data gathering and further malicious activities
Infosecurity News
Proofpoint warned the method could be used for data gathering and further malicious activities
Bleeping Computer
The hacking group known as TA577 has recently shifted tactics by using phishing emails to steal NT LAN Manager (NTLM) authentication hashes to perform account hijacks.
Infosecurity News
The malware, discovered by Proofpoint and Team Cymru, was mainly utilized by initial access brokers
HACKRead
Latrodectus is a downloader malware used by cybercriminals to gain initial access to victim systems and deploy further malicious payloads.
ZDNet
Cyber criminals are trying a new method to help ensure phishing attacks are successful - here's what to watch out for.
Bleeping Computer
A relatively new malware called Latrodectus is believed to be an evolution of the IcedID loader, seen in malicious email campaigns since November 2023.
The Hacker News
A new phishing campaign is using Microsoft Word docs as bait to deliver Nim-based malware.
The Hacker News
PikaBot, a dangerous loader, is spreading via malvertising campaigns targeting users searching for legit software like AnyDesk
The Hacker News
Beware of Water Curupira! This threat actor is spreading PikaBot, more than a malware loader – it's a gateway to ransomware attacks.
The Hacker News
PikaBot malware undergoes a dramatic transformation, simplifying its code and communication methods
Cyber Security News
At the forefront of this digital onslaught is the insidious PikaBot, a malware variant that ingeniously exploits the expansive reach of Google Ads.
DarkReading
Initial access brokers are using the new downloader malware, which emerged just after QBot's 2023 disruption.
The Hacker News
'Latrodectus' strikes via phishing emails. This powerful downloader can execute commands, evade detection, and pave the way for further attacks.
Infosecurity News
Proofpoint researchers observed a new Bumblebee social engineering campaign in February following a four-month absence
SC Magazine
Proofpoint researchers say new malware aligns with trend by cybercriminals to find more creative ways to bypass defenders.
DarkReading
The shadowy threat actor uses some nifty tricks to drop popular malware with targets that meet its specifications.
Cyber Security News
OneNote documents are increasingly being used by threat actors to send malware to unsuspecting end users via email, according to Proofpoint researchers.
CSO
The new IcedID variants are likely used for ransomware delivery, and researchers expect new variants to emerge.
CSO
Cybercriminals continue to launch creative social engineering attacks to trick users. Meanwhile, social engineering misconceptions are exacerbating the risks of falling victim.