Tag: email
-
#Infosec2025: Over 90% of Top Email Domains Vulnerable to Spoofing Attacks
EasyDMARC found that just 7.7% of the world’s top 1.8 million email domains have implemented the most stringent DMARC policy First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/infosec2025-email-domains-spoofing/
-
Facebook Faces One of the Largest Alleged Data Breaches: 1.2 Billion Accounts at Risk
A hacker known as ByteBreaker has surfaced on underground forums, claiming to have stolen data from 1.2 billion Facebook accounts. While Facebook has not confirmed the breach, the hacker is reportedly selling access to a trove of user information, including names, email addresses, phone numbers, profile details, and more. If verified, this could rank as…
-
SilentWerewolf Attack Combines Legitimate Tools with Code Obfuscation for Stealthy Infiltration
The threat actor dubbed SilentWerewolf has employed advanced phishing techniques to infiltrate organizations in Russia and Moldova, focusing on critical sectors such as nuclear energy, aircraft, and mechanical engineering. Starting on March 11, the first campaign used spearphishing emails with malicious links to distribute ZIP archives containing a novel C# loader disguised as legal documents.…
-
Emerging FormBook Malware Threatens Windows Users with Complete System Takeover
A critical cybersecurity threat has surfaced targeting Microsoft Windows users, as detailed in the latest analysis of the FormBook malware. Documented in Part II of a comprehensive FormBook analysis blog, this malware variant poses a severe risk by enabling attackers to gain full remote control over a victim’s computer. Initially delivered through phishing emails exploiting…
-
‘Secure email’: A losing battle CISOs must give up
End-to-end encryption remains elusive: Email continues to be the dominant electronic communication tool today because it is well understood, relatively easy to use, and relatively inexpensive. By and large, businesses have approved email for sending confidential information, and we often convince ourselves that it is secure, can be secured with third-party tools, or it’s “good…
-
New Russian APT group Void Blizzard targets NATO-based orgs after infiltrating Dutch police
Tags: access, api, apt, attack, authentication, blizzard, cloud, credentials, data, defense, detection, edr, email, fido, framework, group, hacker, identity, least-privilege, login, mfa, microsoft, open-source, passkey, password, phishing, qr, risk, russia, siem, spear-phishing, switch, threat, toolSwitch to spear phishing: In recent months the group seems to have pivoted from password spraying to targeted spear phishing attacks that direct users to fake Microsoft Entra login pages using adversary-in-the-middle (AitM) techniques. Such a campaign led to the compromise of 20 NGOs in April.In its campaign against NGOs, Void Blizzard sent emails masquerading…
-
Why Email Aliases Fail DMARC (And How to Fix Them)
Struggling with DMARC alias failures? Learn why your alias emails get blocked and how to fix SPF&DKIM alignment for better deliverability. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/why-email-aliases-fail-dmarc-and-how-to-fix-them/
-
Hackers drop 60 npm bombs in less than two weeks to recon dev machines
Tags: attack, data, detection, email, framework, hacker, malicious, open-source, rce, remote-code-execution, supply-chain, threat, toolThe accounts are now defunct: The first three malicious packages, “e-learning-garena,” “seatalk-rn-leave-calendar,” and “coral-web-be,” were released under the npm accounts bbbb335656, cdsfdfafd1232436437, and sdsds656565, respectively. Since then, all three accounts have gone on to publish twenty malicious packages each.According to Socket, the first package emerged eleven days ago, and the most recent appeared only hours…
-
The Privacy-Friendly Tech to Replace Your US-Based Email, Browser, and Search
Thanks to drastic policy changes in the US and Big Tech’s embrace of the second Trump administration, many people are moving their digital lives abroad. Here are a few options to get you started. First seen on wired.com Jump to article: www.wired.com/story/the-privacy-friendly-tech-to-replace-your-us-based-email-browser-and-search/
-
Microsoft Defender vs Bitdefender: Compare Antivirus Software
Microsoft Defender and Bitdefender are two popular small business security providers with multiple products for small teams. Microsoft Defender can protect your office solutions, like Word and Teams, and business endpoint devices. Bitdefender performs vulnerability scans on your devices and protects your email accounts. I’ve compared both solutions to help you decide which is a…
-
MSP Case Study: How PowerDMARC Became a Game-Changer for HispaColex Tech Consulting
Discover how PowerDMARC empowered HispaColex Tech Consulting to bolster client email security, enhance customer satisfaction, and gain a competitive edge. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/msp-case-study-how-powerdmarc-became-a-game-changer-for-hispacolex-tech-consulting-3/
-
Katz Stealer Targets Chrome, Edge, Brave, and Firefox to Steal Login Credentials
Katz Stealer has emerged as a potent credential-stealing malware-as-a-service, targeting popular web browsers such as Chrome, Edge, Brave, and Firefox. This multi-feature stealer conducts extensive system reconnaissance and data theft by extracting saved passwords, cookies, and session tokens from these browsers. Beyond browsers, it also compromises cryptocurrency wallets, communication platforms like Discord and Telegram, email…
-
FBI Warns of Silent Ransom Group Targeting Law Firms via Scam Calls
FBI warns law firms: Silent Ransom Group uses phishing emails and fake IT calls to steal data, demanding ransom to prevent public leaks. The agency is also urges victims to share ransom evidence. First seen on hackread.com Jump to article: hackread.com/fbi-silent-ransom-group-law-firms-via-scam-calls/
-
Security Affairs newsletter Round 525 by Pierluigi Paganini INTERNATIONAL EDITION
A new round of the weekly Securitythe weekly Security Affairs newsletterAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Silent Ransom Group targeting law firms, the FBI warns Leader of Qakbot cybercrime network…
-
Naukri exposed recruiter email addresses, researcher says
The recruiter website fixed the email address exposure earlier this week. First seen on techcrunch.com Jump to article: techcrunch.com/2025/05/23/naukri-exposed-recruiter-email-addresses-researcher-says/
-
How Hunters International Used the Browser to Breach Enterprises”Š”, “ŠAnd Why They Didn’t See It”¦
How Hunters International Used the Browser to Breach Enterprises”Š”, “ŠAnd Why They Didn’t See It Coming At RSAC 2025, Cato Networks delivered a presentation that SOC teams and CISOs will want to pay attention to: “Suspicious Minds”Š”, “ŠHunting Threats That Don’t Trigger Security Alerts.” The session showcased ransomware campaigns that bypassed traditional detection. In some cases,…
-
DMARC MSP Case Study: ImpactQuill Enhances Email Security and Visibility for Clients with PowerDMARC
Discover how ImpactQuill launched IQDMARC using PowerDMARC’s white label solution to enhance email security, and boost deliverability for clients. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/dmarc-msp-case-study-impactquill-enhances-email-security-and-visibility-for-clients-with-powerdmarc/
-
Hackers Expose 184 Million User Passwords via Open Directory
A major cybersecurity incident has come to light after researcher Jeremiah Fowler discovered a publicly accessible database containing 184,162,718 unique logins and passwords”, totaling 47.42 GB of raw credential data. The exposed records included sensitive information such as emails, usernames, passwords, and direct URLs to login pages for a wide variety of services. These ranged…
-
Operation Endgame 2.0: DanaBusted
Tags: access, attack, backup, banking, breach, business, cloud, communications, control, crypto, cybercrime, data, defense, detection, email, espionage, firewall, fraud, government, group, Hardware, infection, intelligence, international, law, malicious, malware, middle-east, network, programming, ransomware, russia, service, supply-chain, switch, threat, tool, ukraine, update, windowsIntroductionOn May 22, 2025, international law enforcement agencies released information about additional actions that were taken in conjunction with Operation Endgame, an ongoing, coordinated effort to dismantle and prosecute cybercriminal organizations, including those behind DanaBot. This action mirrors the original Operation Endgame, launched in May 2024, which disrupted SmokeLoader, IcedID, SystemBC, Pikabot, and Bumblebee. Zscaler…
-
Russian APT28 compromised Western logistics and IT firms to track aid to Ukraine
Tags: access, advisory, api, authentication, cctv, cloud, computer, container, credentials, cve, cybersecurity, data, detection, email, exploit, flaw, government, hacker, identity, infrastructure, Internet, login, malicious, malware, mfa, military, network, ntlm, office, open-source, password, phishing, powershell, russia, service, software, threat, tool, ukraine, vulnerabilityCredential guessing and spearphishing: The attackers used brute-force credential guessing techniques, also known as password spraying, to gain initial access to accounts. This was complemented with targeted phishing emails that directed recipients to fake login pages for government entities or Western cloud email providers. These phishing pages were stored on free web hosting services or…
-
Email bombing, other techniques leveraged by 3AM ransomware gang
First seen on scworld.com Jump to article: www.scworld.com/brief/email-bombing-other-techniques-leveraged-by-3am-ransomware-gang
-
3am Ransomware Adopts Email Bombing, Vishing Combo Attack
The emerging threat group is the latest to adopt the combo attack tactic, which Black Basta and other groups already are using to gain initial access for ransomware deployment. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/3am-ransomware-adopts-email-bombing-vishing
-
Russia-aligned hackers target Tajikistan in new espionage campaign
The hackers used phishing emails containing government-themed lure documents to gain access to targeted systems. First seen on therecord.media Jump to article: therecord.media/russia-hackers-target-tajikistan-espionage
-
Database Leak Reveals 184 Million Infostealer-Harvested Emails and Passwords
Cybersecurity researcher Jeremiah Fowler discovered a misconfigured cloud server containing a massive 184 million login credentials, likely collected… First seen on hackread.com Jump to article: hackread.com/database-leak-184-million-infostealer-emails-passwords/

