Researchers Discover Way to Attack SharePoint and OneDrive Files With Ransomware

It has long been considered that files stored and edited in the cloud are resilient to encryption extortion – the autosave and versioning features should provide sufficient backup capability.

Browser Automation Framework is the New Threat

Browser Automation Framework is the New Threat - Cybersecurity news - Emerging Threats
Researchers have warned against the increased use of free-to-use browser automation frameworks by attackers that can be abused in malicious activities.  Researchers observed C2 IP addresses linked with malware such as BlackGuard, Bumblebee, and RedLine Stealer communicating with the subdomai ... Read More

Europol Says Deepfakes Set to Be Used Extensively in Organized Crime

Deepfakes involve the application of artificial intelligence to audio and audio-visual consent “that convincingly shows people saying or doing things they never did, or create personas that never existed in the first place.”

EDoS: The Next Big Threat to Your Cloud

EDoS attacks exploit the elasticity of clouds, particularly auto-scaling capabilities, to inflate the billing of a cloud user until the account reaches bankruptcy or large-scale service withdrawal.

The Use of Phishing Toolkits to ByPass 2FA is on the Rise

The Use of Phishing Toolkits to ByPass 2FA is on the Rise - Cybersecurity news - Emerging Threats
Cybersecurity researchers claimed to have found over a thousand phishing toolkits that are able to hack two-factor authentication, allowing hackers to conduct sophisticated attacks on a target system. It is bizarre to admit that most of these MitM phishing toolkits in use by attackers are based on ... Read More

Compromised Cloud Accounts Lead to Cryptomining

Compromised Cloud Accounts Lead to Cryptomining - Cybersecurity news - Emerging Threats
Google’s Threat Horizons report claims that hackers were compromising cloud accounts used for storing files and data. Hackers also leverage cloud instances to perform other malicious activities.

New ETW Attacks May Blind Security Products

New ETW Attacks May Blind Security Products - Cybersecurity news - Emerging Threats
Researchers from Binarly have disclosed two Event Tracing for Windows (ETW) bypass techniques and demonstrated their effectiveness against Windows Defender and Process Monitor.
September 17, 2021

Triple Extortion Ransomware: A New Challenge For Defenders

Ransomware has historically focused on encryption, with the exfiltration and threatened exposure of sensitive data in a “double extortion” attack one of the most popular recent additions.

Saving Private Networks from DNS Rebinding

Saving Private Networks from DNS Rebinding - Cybersecurity news - Emerging Threats
Attackers use the DNS rebinding technique to exploit private networks. It can take over victims' browsers and exposes the attack surface of internal web applications to malicious websites, which can be dangerous. Web browser vendors, web application owners, and DNS resolvers need to apply appropria ... Read More

Attacks on critical infrastructure are dangerous. Soon they could turn deadly, warn analysts

Gartner reckons that hackers will have turned computer systems into weapons to the point that they could injure or kill humans by 2025, and it will cost businesses $50 billion to remediate across IT systems, litigation, and compensation.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags