QR Codes Used in 22% of Phishing Attacks, Study Finds
A recent study reveals that QR codes are being used in a significant number of phishing attacks, making them a potential threat vector for delivering malicious payloads.
A recent study reveals that QR codes are being used in a significant number of phishing attacks, making them a potential threat vector for delivering malicious payloads.
A cyber espionage operation utilizing the MATA framework, previously associated with North Korean hackers Lazarus Group, targets Eastern European companies in the oil and gas sector and defense industry using spear-phishing and an Internet Explorer zero-day bug.
North Korean threat actors Diamond Sleet and Onyx Sleet have been exploiting a critical vulnerability in JetBrains TeamCity servers since October 2023, potentially leading to the theft of source code, service secrets, and private keys.
State-sponsored threat actors from Russia and China are using a high-severity vulnerability in WinRAR to extract sensitive information and compromise targeted systems.
GhostSec, a hacktivist group, has released a groundbreaking ransomware program called GhostLocker that utilizes military-grade encryption algorithms and offers a unique service for managing negotiations following successful breaches.
Continuous vulnerability scanning utilizes automated tools to identify known vulnerabilities and missing patches, providing organizations with real-time monitoring and automation to quickly identify and resolve issues, reducing the risk of breaches.