๐ข Hackers are abusing ConnectWise ScreenConnect, again ๐ข
๐ Read more.
๐ Via "ITPro"
----------
๐๏ธ Seen on @cibsecurity
A new spear phishing campaign has targeted more than 900 organizations with fake invitations from platforms like Zoom and Microsoft Teams.๐ Read more.
๐ Via "ITPro"
----------
๐๏ธ Seen on @cibsecurity
IT Pro
Hackers are abusing ConnectWise ScreenConnect, again
The phishing campaign has targeted hundreds of organizations so far
๐ Fake IT Support Attacks Hit Microsoft Teams ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Fake IT support lures are being used to trick employees into installing remoteaccess tools via Microsoft Teams.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Fake IT Support Attacks Hit Microsoft Teams
Fake IT support lures are being used to trick employees into installing remoteโaccess tools via Microsoft Teams
๐ฆ
SikkahBot Malware Campaign Lures and Defrauds Students in Bangladesh ๐ฆ
๐ Read more.
๐ Via "CYBLE"
----------
๐๏ธ Seen on @cibsecurity
Cyble SikkahBot Malware Campaign Lures and Defrauds Students in Bangladesh " dataimagecaption"Cyble SikkahBot Malware Campaign Lures and Defrauds Students in Bangladesh " datamediumfile"httpscyble.comwpcontentuploads202508CybleBlogsSikkahbot300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202508CybleBlogsSikkahbot.jpg" title"SikkahBot Malware Campaign Lures and Defrauds Students in Bangladesh 1" Executive Summary Cyble Research and Intelligence Labs CRIL has uncovered an ongoing Android malware tracker named "SikkahBot," active since July 2024 and explicitly targeting students in Bangladesh. Disguised as applications from the Bangladesh Education Board, the malware lures victims with promises of scholarships, coerces them into sharing sensitive information, and grants highr...๐ Read more.
๐ Via "CYBLE"
----------
๐๏ธ Seen on @cibsecurity
Cyble
SikkahBot Malware Campaign Defrauds Students In Bangladesh
Cyble Research and Intelligence Labs (CRIL) has uncovered โSikkahBotโ, a new Android malware campaign targeting students in Bangladesh since July 2024.
๐ฆฟ Google Identifies โWidespread Data Theftโ Impacting Salesforce-Salesloft Drift Users ๐ฆฟ
๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
Google Threat Intelligence Group shared its findings about a threat actor responsible for stealing Salesforce customer data via Salesloft Drift.๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
TechRepublic
Google Identifies โWidespread Data Theftโ Impacting Salesforce-Salesloft Drift Users
Google Threat Intelligence Group shared its findings about a threat actor responsible for stealing Salesforce customer data via Salesloft Drift.
๐ Malicious VS Code Extensions Exploit Name Reuse Loophole ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Visual Studio Code extensions have been identified exploiting a loophole that allows reuse of names from removed packages.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Malicious VS Code Extensions Exploit Name Reuse Loophole
Visual Studio Code extensions have been identified exploiting a loophole that allows reuse of names from removed packages
๐ฆฟ Google Identifies โWidespread Data Theftโ Impacting Salesforce-Salesloft Drift Users ๐ฆฟ
๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
Google Threat Intelligence Group shared its findings about a threat actor responsible for stealing Salesforce customer data via Salesloft Drift.๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
TechRepublic
Google Identifies โWidespread Data Theftโ Impacting Salesforce-Salesloft Drift Users
Google Threat Intelligence Group shared its findings about a threat actor responsible for stealing Salesforce customer data via Salesloft Drift.
๐ฆฟ Google Identifies โWidespread Data Theftโ Impacting Salesforce-Salesloft Drift Users ๐ฆฟ
๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
Google Threat Intelligence Group shared its findings about a threat actor responsible for stealing Salesforce customer data via Salesloft Drift.๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
TechRepublic
Google Identifies โWidespread Data Theftโ Impacting Salesforce-Salesloft Drift Users
Google Threat Intelligence Group shared its findings about a threat actor responsible for stealing Salesforce customer data via Salesloft Drift.
๐ Nevada Confirms Ransomware Attack, State Data Stolen ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Nevadas CIO confirmed in a press conference that ransomware actors had exfiltrated data from state networks, amid an ongoing incident investigation.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Nevada Confirms Ransomware Attack, State Data Stolen
Nevadaโs CIO confirmed in a press conference that ransomware actors had exfiltrated data from state networks, amid an ongoing incident investigation
๐ Netherlands Confirms China's Salt Typhoon Targeted Small Dutch Telcos ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Salt Typhoons primary Dutch targets were small internet service providers and hosting providers.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Netherlands Confirms China's Salt Typhoon Targeted Small Dutch Telcos
Salt Typhoonโs primary Dutch targets were small internet service providers and hosting providers
๐ฆฟ Google Identifies โWidespread Data Theftโ Impacting Salesforce-Salesloft Drift Users ๐ฆฟ
๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
Google Threat Intelligence Group shared its findings about a threat actor responsible for stealing Salesforce customer data via Salesloft Drift.๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
TechRepublic
Google Identifies โWidespread Data Theftโ Impacting Salesforce-Salesloft Drift Users
Google Threat Intelligence Group shared its findings about a threat actor responsible for stealing Salesforce customer data via Salesloft Drift.
๐ฆฟ Google Identifies โWidespread Data Theftโ Impacting Salesforce-Salesloft Drift Users ๐ฆฟ
๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
Google Threat Intelligence Group shared its findings about a threat actor responsible for stealing Salesforce customer data via Salesloft Drift.๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
TechRepublic
Google Identifies โWidespread Data Theftโ Impacting Salesforce-Salesloft Drift Users
Google Threat Intelligence Group shared its findings about a threat actor responsible for stealing Salesforce customer data via Salesloft Drift.
๐ฆฟ Google Identifies โWidespread Data Theftโ Impacting Salesforce-Salesloft Drift Users ๐ฆฟ
๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
Google Threat Intelligence Group shared its findings about a threat actor responsible for stealing Salesforce customer data via Salesloft Drift.๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
TechRepublic
Google Identifies โWidespread Data Theftโ Impacting Salesforce-Salesloft Drift Users
Google Threat Intelligence Group shared its findings about a threat actor responsible for stealing Salesforce customer data via Salesloft Drift.
๐ Chinese Tech Firms Linked to Salt Typhoon Espionage Campaigns ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
The US, UK and allies have called out Chinas commercial cyber ecosystem for enabling largescale Salt Typhoon campaigns.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Chinese Tech Firms Linked to Salt Typhoon Espionage Campaigns
The US, UK and allies have called out Chinaโs โcommercial cyber ecosystemโ for enabling large-scale Salt Typhoon campaigns
๐ Malicious VS Code Extensions Exploit Name Reuse Loophole ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Visual Studio Code extensions have been identified exploiting a loophole that allows reuse of names from removed packages.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Malicious VS Code Extensions Exploit Name Reuse Loophole
Visual Studio Code extensions have been identified exploiting a loophole that allows reuse of names from removed packages
๐ Nevada Confirms Ransomware Attack, State Data Stolen ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Nevadas CIO confirmed in a press conference that ransomware actors had exfiltrated data from state networks, amid an ongoing incident investigation.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Nevada Confirms Ransomware Attack, State Data Stolen
Nevadaโs CIO confirmed in a press conference that ransomware actors had exfiltrated data from state networks, amid an ongoing incident investigation
๐ Chinese Tech Firms Linked to Salt Typhoon Espionage Campaigns ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
The US, UK and allies have called out Chinas commercial cyber ecosystem for enabling largescale Salt Typhoon campaigns.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Chinese Tech Firms Linked to Salt Typhoon Espionage Campaigns
The US, UK and allies have called out Chinaโs โcommercial cyber ecosystemโ for enabling large-scale Salt Typhoon campaigns
๐ Nevada Confirms Ransomware Attack, State Data Stolen ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Nevadas CIO confirmed in a press conference that ransomware actors had exfiltrated data from state networks, amid an ongoing incident investigation.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Nevada Confirms Ransomware Attack, State Data Stolen
Nevadaโs CIO confirmed in a press conference that ransomware actors had exfiltrated data from state networks, amid an ongoing incident investigation
๐ Crypto Companies Freeze $47m in Romance Baiting Funds ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Chainalysis, OKX, Binance and Tether have managed to stop nearly 50m reaching romance baiting fraudsters.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Crypto Companies Freeze $47m in Romance Baiting Funds
Chainalysis, OKX, Binance and Tether have managed to stop nearly $50m reaching romance baiting fraudsters
๐ Crypto Companies Freeze $47m in Romance Baiting Funds ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Chainalysis, OKX, Binance and Tether have managed to stop nearly 50m reaching romance baiting fraudsters.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Crypto Companies Freeze $47m in Romance Baiting Funds
Chainalysis, OKX, Binance and Tether have managed to stop nearly $50m reaching romance baiting fraudsters
๐ Chinese Tech Firms Linked to Salt Typhoon Espionage Campaigns ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
The US, UK and allies have called out Chinas commercial cyber ecosystem for enabling largescale Salt Typhoon campaigns.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Chinese Tech Firms Linked to Salt Typhoon Espionage Campaigns
The US, UK and allies have called out Chinaโs โcommercial cyber ecosystemโ for enabling large-scale Salt Typhoon campaigns
๐๏ธ Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide ๐๏ธ
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
The Chinalinked advanced persistent threat APT actor known as Salt Typhoon has continued its attacks targeting networks across the world, including organizations in the telecommunications, government, transportation, lodging, and military infrastructure sectors. "While these actors focus on large backbone routers of major telecommunications providers, as well as provider edge PE and.๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity