Cybercriminals are launching sophisticated attacks against Microsoft 365 and Gmail users with a new and dangerous phishing kit called Tycoon 2FA. This tool poses a serious threat because it bypasses two-factor authentication (MFA), a security measure many users rely on to protect their accounts. Tycoon 2FA: Multi-Stage Deception Security researchers at Sekoia discovered Tycoon 2FA […]
In the ever-expanding realm of cybersecurity, Open Source Intelligence (OSINT) plays a critical role. Sifting through vast amounts of publicly available data is essential for unearthing security vulnerabilities, conducting threat investigations, and bolstering overall security posture. DarkGPT emerges as a revolutionary AI-powered OSINT assistant, leveraging the prowess of GPT-4-200K to precisely query leaked databases – […]
The ever-evolving cyberwarfare landscape takes a sinister turn with the discovery of AcidPour, a new variant of the Russia-linked AcidRain data-wiping malware. This article delves into AcidPour’s capabilities, its connection to its predecessor, and the potential implications for critical infrastructure. The original AcidRain emerged in the early stages of the Russo-Ukrainian war, deployed against KA-SAT […]