‘Marko Polo’ Creates Globe-Spanning Cybercrime Juggernaut

September 17, 2024 at 05:02PM The Marko Polo cybercrime gang is an escalating global financial threat, orchestrating at least 30 concurrent fraud campaigns and utilizing advanced malware to compromise tens of thousands of devices. They impersonate popular brands like Zoom and Discord to target individuals and organizations in gaming, virtual meetings, and cryptocurrency markets, employing … Read more

FBI: North Korean Actors Readying Aggressive Cyberattack Wave

September 4, 2024 at 01:12PM The FBI warns of imminent North Korean threat actor attacks targeting organizations with large cryptocurrency assets. These attacks will involve social engineering tactics and may include crypto theft and malware deployment. The actors are adept at impersonating recruiters and headhunters to establish trust and steal funds. Firms are urged to … Read more

US Health Dept warns hospitals of hackers targeting IT help desks

April 6, 2024 at 12:04PM The U.S. Department of Health and Human Services warns of hackers using social engineering to target IT help desks in the Healthcare and Public Health sector. They gain access by enrolling their own MFA devices and using AI voice cloning. Similar tactics are used by the Scattered Spider threat group. … Read more

Iran-Backed Charming Kitten Stages Fake Webinar Platform to Ensnare Targets

February 22, 2024 at 10:21AM State-sponsored cyber operations are increasingly targeting policy experts in the Middle East and Ukraine. Charming Kitten/CharmingCypress, an Iran-linked group, employs social engineering tactics and malware to compromise targets. Other groups, such as ColdRiver and Jordan-based actors, have also used similar methods to target experts. Volexity advises experts to be vigilant … Read more

5 Steps to Improve Your Security Posture in Microsoft Teams

February 13, 2024 at 10:11AM Summary: Despite being underestimated, SaaS chat apps like Microsoft Teams and Slack are susceptible to sophisticated cyber threats, including phishing campaigns and malware attacks. These attacks exploit vulnerabilities in Teams’ external access settings, posing a growing risk to users. To mitigate these risks, organizations are advised to implement specific remediation … Read more