Search Results for: phishing campaign
Phishing Campaign Targets Global Zimbra Collaboration Email Servers
Widespread attempts to steal login credentials from organizations, leaving cybersecurity professionals on high alert. Attack on Zimbra Collaboration email servers An ongoing phishing campaign has [more…]
MuddyWater Sophisticated Spear Phishing Tactics During Israel-Hamas Conflict
Deep Instinct’s Threat Research team has recently discovered an escalated campaign from the notorious MuddyWater group. This campaign significantly targets Israeli infrastructure and exhibits an [more…]
Exponential 1265% Surge in Phishing Emails Traced to AI Tools
The New Normal: A 1265% Increase in Phishing Emails The threat landscape has undergone a seismic shift over the past year, and a new report [more…]
China’s Espionage Playbook: Unveiling the Cyber Campaign Against East Asian Semiconductor Companies
Introduction: The Silent War in the Semiconductor Space In an era where data is the new oil, semiconductors are the new pipelines. These tiny components [more…]
Unmasking Operation Jacana: A Cyberespionage Campaign Against Guyana’s Government
Introduction: An Unfamiliar Battlefield Cybersecurity is often likened to a game of cat and mouse, where each side continually evolves to outwit the other. But [more…]
The Netherlands’ New Public Campaign Against Cybercrime
Introduction Cybersecurity has become a ubiquitous concern, pervading every aspect of our digital lives. Governments worldwide are escalating efforts to educate the public on the [more…]
State Actor Targets JumpCloud in Spear Phishing Attack
JumpCloud, a software company providing a platform for organizations to manage users, devices, and access to IT resources, recently faced a security incident. The company [more…]
Microsoft Warns of Phishing Attacks by Storm-0978 Group Targeting Defense and Government Entities
Microsoft has raised an alert about an ongoing phishing campaign conducted by the cybercriminal group known as Storm-0978. The threat actor, also referred to as [more…]
Can Multisource Data Correlation Truly Support Threat Intelligence?
In the ever-evolving landscape of cyber threats, the need for advanced and sophisticated threat intelligence mechanisms cannot be overstated. But what happens when single-source data [more…]
Suspect Maric M. Accused of Massive Data Theft Involving Over 335,000 Compromised Accounts
New findings from the Public Prosecutor’s Office in the Netherlands have identified Maric M. as the country’s most significant user of the now-defunct criminal trading [more…]