Hackers steal Outlook credentials using overlay screens on legitimate websites.
Researchers from Cofense spotted a phishing campaign that uses overlay screen and quarantine policies to steal Microsoft Outlook credentials from the victims.
Each week Zacco tracks the latest cyber security threats, current industry news or trends and insights into the latest protection best practice. The Cyber Security Digest is a weekly compilation of the most significant developments within both cybersecurity and digital protection space, with links to further information on how it might affect you, your company or your clients.
Essential reading for cyber security professionals, as well as the general public, to keep you informed of current events and emerging threats.
Researchers from Cofense spotted a phishing campaign that uses overlay screen and quarantine policies to steal Microsoft Outlook credentials from the victims.
The Magecart group’s new way to steal data is by using the encrypted messaging service to send stolen payment details from compromised websites back to the attackers.
Four flaws were discovered by a Norwegian cybersecurity firm Watchcom during a pentest.
The email of some lawmakers was accessed by hackers under the massive cyber-attack said the parliament.
Patrick Wardle a security researcher reported that apple mistakenly approves Shlayer malware that mimicked to be an update for Adobe Flash player for its macOS.
The new malware family uses remote administration tool to maintain assess to the victim’s computer to control it.
The unpatched vulnerability if exploited could have led to code execution and privilege escalation
THOMSON THT741FTA and Philips DTR3502BFTA are the DVB-T2 set-top box that is vulnerable to botnet and ransomware attack
3 researchers David Basin, Ralf Sasse, and Jorge Toro-Pozo from the Department of Computer Science at ETH Zurich have discovered vulnerabilities in the protocol which could let hackers conduct a man in the middle attack
Pawel Wylecial researcher from REDTEAM.PL discovered the flaw on both macOS and iOS.
The trojan is known for stealing bank account credentials and other financial information now target government, military, and manufacturing sectors in the US and Europe
Malicious code named” SourMint” found in a popular iOS software development kit which is used by 1200 apps and has over one billion mobile users
Upstream’s security platform called Secure-D Triada and x helper malware has carried out 19.2 million suspicions transactions over 200000 used and new phones
Bitdefender’s Cyber Threat Intelligence Lab spotted an espionage attack on an unnamed international architectural and video production company.
Israeli firm Clearsky said that they have observed the APT group Charming Kitten is using new tactics to target its victims.
Cyberespionage group known for targeting government, defence technology, military, and diplomacy sectors are posing as journalists targets victims via LinkedIn and WhatsApp and infect their devices with malware.
Indian citizen Sudhish Kasaba Ramesh pleads guilty for damaging Cisco’s internal network.