Phishing Attacks Evolve: Protecting Yourself from Remote Access Fraud While one-time passwords (OTPs) add security to online transactions, cybercriminals are devising new methods to steal money. This article explores a recent scam where attackers bypass OTPs to gain unauthorized access to bank accounts. The Scam Phishing with a Twist: Fraudsters send messages disguised as bank […]
The world of cybercrime continues to evolve, and a recent development involving the INC Ransomware operation highlights this ongoing trend. According to threat intelligence experts at KELA, a cybercriminal using the alias “salfetka” has allegedly posted an offer on Exploit and XSS hacking forums to sell the source code for both the Windows and Linux/ESXi […]
Recent investigations unveil the increasingly sophisticated methods employed by the Advanced Persistent Threat (APT) group ToddyCat. This report details their techniques for hijacking network infrastructure and exfiltrating sensitive data from government organizations across the Asia-Pacific region. Previously known for utilizing data collection and exfiltration tools, ToddyCat has demonstrably enhanced its capabilities by integrating advanced traffic […]