credential
-
VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access
A recently patched security flaw impacting VMware ESXi hypervisors has been actively exploited by “several” ransomware groups to gain elevated…
Read More » -
How a Trust Center Solves Your Security Questionnaire Problem
Security questionnaires aren’t just an inconvenience — they’re a recurring problem for security and sales teams. They bleed time from…
Read More » -
PINEAPPLE and FLUXROOT Hacker Groups Abuse Google Cloud for Credential Phishing
A Latin America (LATAM)-based financially motivated actor codenamed FLUXROOT has been observed leveraging Google Cloud serverless projects to orchestrate credential…
Read More » -
How to Set up an Automated SMS Analysis Service with AI in Tines
The opportunities to use AI in workflow automation are many and varied, but one of the simplest ways to use…
Read More » -
Safeguard Personal and Corporate Identities with Identity Intelligence
Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. Each…
Read More » -
Pro-Houthi Group Targets Yemen Aid Organizations with Android Spyware
A suspected pro-Houthi threat group targeted at least three humanitarian organizations in Yemen with Android spyware designed to harvest sensitive…
Read More » -
Automated Threats Pose Increasing Risk to the Travel Industry
Jul 18, 2024The Hacker NewsCybersecurity / Bot Attacks As the travel industry rebounds post-pandemic, it is increasingly targeted by automated…
Read More » -
Navigating Insider Risks: Are your Employees Enabling External Threats?
Jul 17, 2024The Hacker NewsInsider Threats / Cybersecurity Attacks on your network are often meticulously planned operations launched by sophisticated…
Read More » -
Scattered Spider Adopts RansomHub and Qilin Ransomware for Cyber Attacks
Jul 17, 2024NewsroomCybercrime / Ransomware The infamous cybercrime group known as Scattered Spider has incorporated ransomware strains such as RansomHub…
Read More »