- Home
- Cybercrime and Ransomware
- Emerging Tech
- Threat Intelligence
- Expert Insights
- Careers and Learning
- Compliance
Subscribe to Updates
Subscribe to our newsletter and never miss our latest news
Subscribe my Newsletter for New Posts & tips Let's stay updated!
Browsing: credential theft
Quick Takeaways Attackers, likely nation-states, used AI to discover zero-day vulnerabilities and automate bypassing two-factor…
Quick Takeaways Attackers exploit misconfigured AD CS certificate templates—such as overly permissive rights and subject…
Fast Facts A maliciously altered version of the Jenkins AST plugin was published, exploiting supply…
Top Highlights TCLBANKER, a sophisticated Brazilian banking trojan, uses environment checks, anti-analysis techniques, and signed…
Top Highlights Attackers increasingly use stolen credentials and access tokens to infiltrate systems, making breaches…
Essential Insights The PCPJack framework targets exposed cloud services (e.g., Docker, Kubernetes, Redis, MongoDB) to…
Quick Takeaways Threat actors used CloudZ RAT and a new Pheno plugin to hijack Microsoft…
Fast Facts Microsoft Edge stores all user passwords in clear text within process memory, accessible…
Top Highlights Attackers implant CloudZ RAT and a custom plugin "Pheno" to steal credentials, OTPs,…
Summary Points Malicious Ruby gems and Go modules disguised as legitimate libraries are used to…