Clop ransomware, infamous for exploiting critical vulnerabilities in file transfer software, has launched an extortion campaign against 66 companies affected by a data theft incident linked to Cleo’s software. The group has given these organizations 48 hours to initiate ransom negotiations, threatening to reveal their identities and publicly leak sensitive data. This marks another in […]
An ongoing Google Calendar phishing attack is exploiting meeting invites and Google Drawings to bypass spam filters and steal credentials. Over four weeks, the attack has targeted 300 brands, sending more than 4,000 phishing emails, according to cybersecurity researchers at Check Point. Check Point researchers told BleepingComputer that this phishing campaign spans various industries, including […]