Cybersecurity Blog
‘Konfety’ Ad Fraud Uses 250+ Google Play Decoy Apps to Hide Malicious Twins
Details have emerged about a “massive ad fraud operation” that leverages hundreds of apps on the Google Play ...
Attackers Exploit URL Protections to Disguise Phishing Links
Phishing campaigns are utilizing three different URL protection services to disguise phishing URLs and trick victims ...
ShadowRoot Ransomware Targets Turkish Businesses
The attackers target Turkish businesses with this ransomware campaign, distributing it via email addresses like ...
HardBit Ransomware Version 4.0 Supports New Obfuscation Techniques
To ensure victims cannot recover encrypted files easily, the ransomware deletes the Volume Shadow Copy Service (VSS) and ...
DNS Hijacks Target Cryptocurrency Platforms Registered With Squarespace
A coordinated wave of DNS hijacking attacks recently targeted decentralized finance (DeFi) cryptocurrency domains. ...
Threat Prevention & Detection in SaaS Environments – 101
Identity-based threats on SaaS applications are a growing concern among security professionals, although few have the ...
Malicious npm Packages Found Using Image Files to Hide Backdoor Code
Cybersecurity researchers have identified two malicious packages on the npm package registry that concealed backdoor ...
Risk Related to Non-Human Identities: Believe the Hype, Reject the FUD
The hype surrounding non-human identities (NHIs) has recently increased due to the risk they pose, with breaches causing ...