Phishing Bypasses Email Security with Blob URLs
Cofense Intelligence researchers have uncovered a phishing method that uses Blob URIs to sneak fake login pages into users’ inboxes while avoiding email security filters. Blob URIs, normally used by [...]
New Malware Hides in Bitmap Images of .NET Apps
Cybersecurity experts at Palo Alto Networks’ Unit 42 have discovered a new method attackers use to hide malware inside bitmap images found in harmless-looking 32-bit .NET applications. This clever trick, [...]
Cybercriminals Exploit IT Help Desks as Entry Point for Attacks
Cybercriminals are increasingly pretending to be IT staff or trusted authorities to trick employees into giving them access to sensitive systems, recent cybersecurity reports reveal. These attackers rely on “authority [...]
Cisco Patches Critical SISF Vulnerability Affecting Multiple Products
Cisco has issued critical security updates to address a vulnerability in its Switch Integrated Security Features (SISF), which affects several of its software platforms. The flaw could let attackers on [...]
Agenda Ransomware Adds SmokeLoader & NETXLOADER
The Agenda ransomware group (Qilin) ramped up attacks in early 2025, hitting key sectors worldwide with tools like NETXLOADER and SmokeLoader, Trend Micro reports. Agenda Ransomware The Agenda ransomware group, [...]
Get Social