Category: Threat Intel Reports


  • Coinbase phishing email tricks users with fake wallet migration

    ![Coinbase](https://www.bleepstatic.com/content/hl-images/2025/03/14/coinbase-header-bright.jpg)A large-scale Coinbase phishing attack poses as a mandatory wallet migration, tricking recipients into setting up a new wallet with…


  • SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware

    MalwareSocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware=================================================================================Trend Research analyzed SocGholish’s MaaS framework and its role in deploying RansomHub ransomware…


  • Malicious PyPI Packages Stole Cloud Tokens-Over 14,100 Downloads Before Removal

    ![Malicious PyPI Packages](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCKm0W6Smhs8d_aZlimvRWcIqLvORW1VZ14ceCMMgi4kB2tYz_2dxEmBi0by3FAB7IsKgDcM69Of_yBcT-XP0_gbCEYC9QEXTwPTgVrTV-H07kxGA5f5ekvjLUA390B6O111GoIZhPXtXcfT3otnfkataMHrCktMHgrtNj3pXGzbqIn3WhWCXHNIdhDIAl/s728-rw-e365/supply-chain.png ‘Malicious PyPI Packages’)Cybersecurity researchers have warned of a malicious campaign targeting users of the Python Package Index…


  • Appellate court upholds sentence for former Uber cyber executive Joe Sullivan

    ![Joe Sullivan, former Uber executive](https://cms.therecord.media/uploads/format_webp/large_Joe_Sullivan_Sikkerhetsfestivalen_2024_384c78ac35.jpg)Joe Sullivan speaks at the 2024 Sikkerhetsfestivalen conference in Norway. Image: Wikimedia Commons / Arve Synd…


  • Threat Actor Impersonates Booking.com in Phishing Scheme

    ![Picture of Alexander Culafi, Senior News Writer, Dark Reading](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte0c88f087d1ad6f5/67c609df64f983454c3dd40b/1571751486317.jpg?width=100&auto=webp&quality=80&disable=upscale ‘Picture of Alexander Culafi, Senior News Writer, Dark Reading’) [Alexander Culafi,…


  • ClickFix: How to Infect Your PC in Three Easy Steps

    A clever malware deployment scheme [first spotted in targeted attacks last year](https://krebsonsecurity.com/2024/09/this-windows-powershell-phish-has-scary-potential/) has now gone mainstream. In this scam, dubbed…


  • Man-in-the-Middle Vulns Provide New Research Opportunities for Car Security

    ![Picture of Kristina Beek, Associate Editor, Dark Reading](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2248772495e9caeb/64f17d73018a7c55e8822fc1/KristinaB.jpg?width=100&auto=webp&quality=80&disable=upscale ‘Picture of Kristina Beek, Associate Editor, Dark Reading’) [Kristina Beek, Associate Editor,…


  • Ransomware Developer Extradited, Admits Working for LockBit

    ![Picture of Kristina Beek, Associate Editor, Dark Reading](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2248772495e9caeb/64f17d73018a7c55e8822fc1/KristinaB.jpg?width=100&auto=webp&quality=80&disable=upscale ‘Picture of Kristina Beek, Associate Editor, Dark Reading’) [Kristina Beek, Associate Editor,…


  • From South America to Southeast Asia: The Fragile Web of REF7707

    While the REF7707 campaign is characterized by a well-engineered, highly capable, novel intrusion set, the campaign owners exhibited poor campaign…


  • U.S. CISA adds six Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog

    U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds six Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog.———————————————————————————————————————————————The U.S. Cybersecurity…