
Phishing Campaign Uses SharePoint to Slip Past Defenses
Posted by , 06-09-2019Cybercriminals targeting financial institutions in the UK bypassed Symantec email gateway and other perimeter technologies. A newly discovered phishing campaign aims to slip past perimeter se...

Exercise Cyber Star participants test out complex cyberattack scenarios
Posted by , 06-09-2019SINGAPORE: More than 250 participants took part in the third and largest multi-sector exercise aimed at improving Singapore’s crisis response capabilities and readiness to respond effectively to...

DoD unveils new cybersecurity certification model for contractors
Posted by , 06-09-2019The Defense Department sees its new certification model, which it unveiled to the public this week, as a way to more quickly bring its entire industrial base up to date with best cybersecurity practic...

A huge database of Facebook users’ phone numbers found online
Posted by , 06-09-2019Hundreds of millions of phone numbers linked to Facebook accounts have been found online. The exposed server contained more than 419 million records over several databases on users ac...

A Chinese APT is now going after Pulse Secure and Fortinet VPN servers
Posted by , 05-09-2019A group of Chinese state-sponsored hackers is targeting enterprise VPN servers from Fortinet and Pulse Secure after details about security flaws in both products became public knowledge last month. T...

Powershell RAT - Python Backdoor Tool Use Gmail To Exfiltrate Data as An Attachment
Posted by , 03-09-2019Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using scre...