MFA Bypass via AiTM Phishing Campaigns
The hacker can login without credentials using oauth2-attacks via Session. Hacker developed a tool called DEV-1101 which is now tracked…
Vulnerability in Outlook already being exploited
Vulnerability in Outlook already being exploited
Emotet evades Antivirus defenses through OneNote attachments
Emotet once again. But this time the distribution is through OneNote attachments to evade macro security. The new wave of…
Machine Learning for Zero Trust Approach
Zero Trust is a concept based on an alternative It security model that, in the absence of a trusted network…
Hardbit negotiates based on victims’ cyber policy
The latest version of Hardbit ransomware encrypts data without first copying it, buying valuable time for the operation. Operators then…
PayPal accounts under attack
According to PayPal, cyber criminals used stolen credentials from other data breaches to gain access to the accounts of about…
A criminal group has discovered how to use old drive to exploit and privilege-scaling Windows
According to Crowdstrike, EDRs (Endpoint Detection and Response) are in the crosshairs of BYOVD (Bring Your Own Vulnerable Driver) attacks.…