π’ Salesloft Drift hackers had access to company GitHub account for months before attacks π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Hackers behind the Salesloft Drift breach had access to the companys GitHub account for several months before waging a flurry of attacks, the company has revealed.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Salesloft Drift hackers had access to company GitHub account for months before attacks
Dozens of large enterprises have been impacted by the Salesloft Drift breach
π’ Salesloft Drift hackers had access to company GitHub account for months before attacks π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Hackers behind the Salesloft Drift breach had access to the companys GitHub account for several months before waging a flurry of attacks, the company has revealed.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Salesloft Drift hackers had access to company GitHub account for months before attacks
Dozens of large enterprises have been impacted by the Salesloft Drift breach
π’ FBI warns 'indiscriminate' Salt Typhoon hacking campaign has hit organizations in more than 80 countries π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The Salt Typhoon hacker group has waged several major campaigns against US telecoms companies and critical infrastructure operators now it's ramping up attacks globally.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
FBI warns 'indiscriminate' Salt Typhoon hacking campaign has hit organizations in more than 80 countries
The agency has issued an advisory on the China-linked Salt Typhoon hacker group
π’ FBI warns 'indiscriminate' Salt Typhoon hacking campaign has hit organizations in more than 80 countries π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The Salt Typhoon hacker group has waged several major campaigns against US telecoms companies and critical infrastructure operators now it's ramping up attacks globally.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
FBI warns 'indiscriminate' Salt Typhoon hacking campaign has hit organizations in more than 80 countries
The agency has issued an advisory on the China-linked Salt Typhoon hacker group
ποΈ [Webinar] Shadow AI Agents Multiply Fast β Learn How to Detect and Control Them ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
One click is all it takes. An engineer spins up an experimental AI Agent to test a workflow. A business unit connects to automate reporting. A cloud platform quietly enables a new agent behind the scenes. Individually, they look harmless. But together, they form an invisible swarm of Shadow AI Agentsoperating outside securitys line of sight, tied to identities you dont even know exist.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Open Source Community Thwarts Massive npm Supply Chain Attack π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
What could have been a historic supply chain attack seems to have been averted due to the rapid response of the open source community.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Open Source Community Thwarts Massive npm Supply Chain Attack
What could have been a historic supply chain attack seems to have been averted due to the rapid response of the open source community
π Open Source Community Thwarts Massive npm Supply Chain Attack π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
What could have been a historic supply chain attack seems to have been averted due to the rapid response of the open source community.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Open Source Community Thwarts Massive npm Supply Chain Attack
What could have been a historic supply chain attack seems to have been averted due to the rapid response of the open source community
π Threat Actor Accidentally Exposes AI-Powered Operations π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A threat actor accidentally revealed their AIpowered methods by installing Huntress security software.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Threat Actor Accidentally Exposes AI-Powered Operations
A threat actor accidentally revealed their AI-powered methods by installing Huntress security software
π Open Source Community Thwarts Massive npm Supply Chain Attack π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
What could have been a historic supply chain attack seems to have been averted due to the rapid response of the open source community.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Open Source Community Thwarts Massive npm Supply Chain Attack
What could have been a historic supply chain attack seems to have been averted due to the rapid response of the open source community
π Threat Actor Accidentally Exposes AI-Powered Operations π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A threat actor accidentally revealed their AIpowered methods by installing Huntress security software.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Threat Actor Accidentally Exposes AI-Powered Operations
A threat actor accidentally revealed their AI-powered methods by installing Huntress security software
ποΈ Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft's Direct Send feature to form a "highly efficient attack pipeline" in recent phishing campaigns, according to new findings from ReliaQuest. "Axios user agent activity surged 241 from June to August 2025, dwarfing the 85 growth of all other flagged user agents combined," the cybersecurity company said in a.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft's Direct Send feature to form a "highly efficient attack pipeline" in recent phishing campaigns, according to new findings from ReliaQuest. "Axios user agent activity surged 241 from June to August 2025, dwarfing the 85 growth of all other flagged user agents combined," the cybersecurity company said in a.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ Salesloft Drift hackers had access to company GitHub account for months before attacks π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Hackers behind the Salesloft Drift breach had access to the companys GitHub account for several months before waging a flurry of attacks, the company has revealed.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Salesloft Drift hackers had access to company GitHub account for months before attacks
Dozens of large enterprises have been impacted by the Salesloft Drift breach
ποΈ From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malwareturnedremote access trojan called MostereRAT. The phishing attack incorporates a number of advanced evasion techniques to gain complete control over compromised systems, siphon sensitive data, and extend its functionality by serving secondary plugins, Fortinet FortiGuard Labs said. ".π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ Cyber attacks: Can the channel save the day? π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Channel partners are becoming the first and often only line of defence for businesses facing growing cybersecurity threats.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ChannelPro
Cyber attacks: Can the channel save the day?
Channel partners are becoming the first β and often only β line of defence for businesses facing growing cybersecurity threats
π’ Cyber attacks: Can the channel save the day? π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Channel partners are becoming the first and often only line of defence for businesses facing growing cybersecurity threats.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ChannelPro
Cyber attacks: Can the channel save the day?
Channel partners are becoming the first β and often only β line of defence for businesses facing growing cybersecurity threats
π Axios User Agent Helps Automate Phishing on βUnprecedented Scaleβ π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
ReliaQuest warns that phishing campaigns abusing the Axios user agent have surged 241 in three months.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Axios User Agent Helps Automate Phishing on βUnprecedented Scaleβ
ReliaQuest warns that phishing campaigns abusing the Axios user agent have surged 241% in three months
π’ Salesloft Drift hackers had access to company GitHub account for months before attacks π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Hackers behind the Salesloft Drift breach had access to the companys GitHub account for several months before waging a flurry of attacks, the company has revealed.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Salesloft Drift hackers had access to company GitHub account for months before attacks
Dozens of large enterprises have been impacted by the Salesloft Drift breach
π Axios User Agent Helps Automate Phishing on βUnprecedented Scaleβ π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
ReliaQuest warns that phishing campaigns abusing the Axios user agent have surged 241 in three months.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Axios User Agent Helps Automate Phishing on βUnprecedented Scaleβ
ReliaQuest warns that phishing campaigns abusing the Axios user agent have surged 241% in three months
π Salty2FA Phishing Kit Unveils New Level of Sophistication π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Salty2FA phishing campaign showcases advanced techniques and professionalism of cybercrime operations.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Salty2FA Phishing Kit Unveils New Level of Sophistication
Salty2FA phishing campaign showcases advanced techniques and professionalism of cybercrime operations
π Salty2FA Phishing Kit Unveils New Level of Sophistication π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Salty2FA phishing campaign showcases advanced techniques and professionalism of cybercrime operations.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Salty2FA Phishing Kit Unveils New Level of Sophistication
Salty2FA phishing campaign showcases advanced techniques and professionalism of cybercrime operations