PartnerLeak scam site promises victims full access to “cheating” partner’s stolen data
We dug into PartnerLeak, the site behind the “your partner is cheating on you” emails, including how and where the scammers get their information.
Read moreWe dug into PartnerLeak, the site behind the “your partner is cheating on you” emails, including how and where the scammers get their information.
Read more
Credit to Author: Nicolas Pommier| Date: Thu, 22 Aug 2024 17:27:46 +0000
270 responsables informatiques/cybersécurité partagent leurs expériences en matière de ransomwares au cours de l’année passée.
Read morePayment gateway provider Slim CD has notified 1.7 million users that their credit card information may have been leaked.
Read more
Credit to Author: Nicolas Pommier| Date: Wed, 21 Aug 2024 15:03:26 +0000
Sophos a découvert les acteurs malveillants se cachant derrière le ransomware RansomHub et qui utilisent EDRKillShifter dans leurs attaques.
Read moreScammers are now throwing in the name of the partner of the targeted victim, telling them that their partner is cheating on them.
Read more
Credit to Author: Nicolas Pommier| Date: Tue, 20 Aug 2024 15:03:08 +0000
Le groupe de ransomware “Mad Liberator” s’appuie sur des techniques d’ingénierie sociale pour scruter son environnement.
Read moreThis week on the Lock and Code podcast, we speak with Eva Galperin about the arrest of Telegram’s CEO and how it impacts security and privacy.
Read moreCredit to Author: Microsoft Threat Intelligence and Microsoft Security Response Center (MSRC)| Date: Fri, 30 Aug 2024 16:00:00 +0000
Microsoft identified a North Korean threat actor exploiting a zero-day vulnerability in Chromium (CVE-2024-7971) to gain remote code execution (RCE) in the Chromium renderer process. Our assessment of ongoing analysis and observed infrastructure attributes this activity to Citrine Sleet, a North Korean threat actor that commonly targets the cryptocurrency sector for financial gain.
The post North Korean threat actor Citrine Sleet exploiting Chromium zero-day appeared first on Microsoft Security Blog.
Read moreCredit to Author: Microsoft Incident Response| Date: Wed, 28 Aug 2024 19:00:00 +0000
In this blog post, read how Microsoft Incident Response leverages three types of threat intelligence to enhance incident response scenarios.
The post The art and science behind Microsoft threat hunting: Part 3 appeared first on Microsoft Security Blog.
Read more