BLUFFS Bluetooth Attack is Putting Devices at Risk

Recent investigations have brought to light a series of sophisticated attacks posing a significant threat to the forward secrecy and future secrecy guarantees of Bluetooth Classic. These exploits specifically create scenarios for adversary-in-the-middle (AitM) attacks between already connected peer…


0 Comments6 Minutes

WailingCrab malware

Emails with a shipping theme are being used to spread a new WailingCrab malware loader.

Cybercriminals are employing email messages centred around delivery and shipping to spread a newly identified and sophisticated malware loader named WailingCrab. “The malware itself is split into multiple components, including a loader, injector, downloader, and backdoor,” stated…


0 Comments7 Minutes

North Korean hackers

North Korean hackers pose as recruiters and job seekers.

Threat actors from North Korea have been linked to two campaigns. In these instances, they distribute malware and engage in unauthorized job applications with companies in the United States and other countries by pretending to be recruiters and job seekers. [FREE E-BOOK] The Definite Blueprint for…


0 Comments6 Minutes

Play Ransomware

Play Ransomware Is being Provided as a Service to Cybercriminals

The Play ransomware strain has transformed into a lucrative business model, being marketed to other threat actors “as a service,” according to new data that was discovered by Adlumin. [FREE E-BOOK] The Definite Blueprint for Cybersecurity in Manufacturing “The unusual lack of…


0 Comments4 Minutes

Rhysida Ransomware

CISA Issue a Public Alert Regarding Rhysida Ransomware

The threat actors behind the Rhysida ransomware conduct opportunistic attacks on enterprises in a variety of industries. The US Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC)…


0 Comments5 Minutes