JuiceLedger

JuiceLedger hackers are responsible for recent phishing attacks on PyPI users

More information about the operators behind the first-known phishing campaign has surfaced by JuiceLedger Hackers, specifically aimed at the Python Package Index (PyPI), the programming language’s official third-party software repository. SentinelOne and Checkmarx described the group as a…


0 Comments2 Minutes

Critical Security Controls

CIS Critical Security Controls V8: Steps and Template Download

With the changing technological landscape, the CIS Critical Security Controls v8 presents a more consolidated approach that replaces CIS Top 20 (V7), which was released some time ago. This article explains what each control is and why it is required. What is the Center for Internet Security and…


0 Comments22 Minutes

MITRE ATT&CK Framework

A CISO’s Guide to the MITRE ATT&CK Framework

The majority of businesses today consider cyber security to be a routine activity. Cyberattacks no longer elicit the same shock and terror that they once did. They are now just part of the job. Despite this natural progression, the volume and severity of cyber attacks continue to grow,…


0 Comments11 Minutes

Executive Impersonation Fraud

6 Ways to Avoid C-Level Executive Impersonation Fraud

How confident are you that your employees would recognize a phishing email if they received one? Would they be able to identify the difference between an email from a C-level manager and a fake? What if your executive’s email account was hacked? Executive Impersonation Fraud provides cyber…


0 Comments5 Minutes

Sideloading

Sideloading: what is it and how does it work?

Sideloading refers to software installation from a third party rather than an authorized source, such as apps not available through official vendors or app stores. This vulnerability gives attackers yet another critical opportunity. Why is a security risk? Third-party applications may not have…


0 Comments4 Minutes

Deepfake

Deepfake: What is It and How to Stay Safe?

Separating fact from fiction when surfing the web has become increasingly complex over the past decade. People are less likely to examine the information they consume as their dependence on electronic communication, and virtual collaboration technology has increased. Deepfake cost news exceeding…


0 Comments8 Minutes

Security Validation Checklist

10-Step Security Validation Checklist for CISOs

Are you confident that your security controls will allow you to relax while you’re away from the office on a well-deserved vacation? More importantly, do you have a solid action plan to ensure a smooth transition? | Security Validation Checklist Whether you’re leaving or returning to…


0 Comments5 Minutes

Borat RAT

Borat RAT: A Malicious Package that Combines Remote Access, Spyware, and Ransomware!

Cyble, an Atlanta-based cyber risk intelligence firm, discovered a new Remote Access Trojan (RAT) malware. So what distinguishes this Borat RAT malware enough to be named after Sacha Baron Cohen’s comic creation? What are Remote Access Trojans (Borat RAT)? RAT malware typically assists…


0 Comments6 Minutes

Smishing

What You Should Know About Smishing

Smishing, the use of text messaging to trick individuals into disclosing critical personal information, is on the rise. In this article, we’ll look at why smishing is on the rise and what you can do to mitigate the dangers to your company and staff. What exactly is smishing? Smishing is a…


0 Comments6 Minutes

Phishing Method

Phishing Method for Bypassing MFA Discovered using WebView2

Phishing Method Using the Microsoft WebView2 software, a security researcher has devised a new phishing tactic. This new approach can bypass MFA and steal login cookies, posing significant threats to the organization and individual users. Phishing Method was discovered by security researchers,…


0 Comments6 Minutes