Category: Threat Intel Reports
-
Graces Bags Scam Online Store
* ![Category](https://www.onlinethreatalerts.com/images/icon-225.png) [Scamming – Fraud](/categories/phishing-scamming-fraud-identity-theft/) Graces Bags Scam Online Store=============================* ![Comments](https://www.onlinethreatalerts.com/images/comment4.png) 0 0* ![OTA](https://www.onlinethreatalerts.com/images/eye.png) 0* ![Like](https://www.onlinethreatalerts.com/images/thumbup.png) 0 * ![Date published](https://www.onlinethreatalerts.com/images/history.png)…
-
Is Foodaki a Scam? Wishing You a Merry Christmas and Happy New Year
* ![Category](https://www.onlinethreatalerts.com/images/icon-225.png) [Spamming – Adware](/categories/spamming-adware/) Is Foodaki a Scam? Wishing You a Merry Christmas and Happy New Year===================================================================* ![Comments](https://www.onlinethreatalerts.com/images/comment4.png) 0…
-
Unmasking online threats – How a VPN ensures security and safety
* ![Category](https://www.onlinethreatalerts.com/images/icon-225.png) [Useful – Informative](/categories/useful-informative/) Unmasking online threats — How a VPN ensures security and safety=================================================================* ![Comments](https://www.onlinethreatalerts.com/images/comment4.png) 0 0* ![OTA](https://www.onlinethreatalerts.com/images/eye.png)…
-
Attacks by APTC60 Group Exploiting Legitimate Services
The APT-C-60 group targeted organizations in Japan and East Asia with a sophisticated attack campaign. The attack begins with a…
-
Gaming Engines: An Undetected Playground for Malware Loaders
Check Point Research uncovered a new technique exploiting the Godot Engine to execute malicious GDScript code, remaining undetected by most…
-
Year In Review: Australia Expands Cyber Regulation
[Geo-Specific](https://www.govinfosecurity.com/geo-specific-c-518) , [Standards, Regulations -& Compliance](https://www.govinfosecurity.com/standards-regulations-compliance-c-435)Year In Review: Australia Expands Cyber Regulation==================================================2024 Marked the Government’s Increasing Role Mandating Cybersecurity [Jayant…
-
US Congress Authorizes $3B to Replace Chinese Telecom Gear
[Critical Infrastructure Security](https://www.govinfosecurity.com/critical-infrastructure-security-c-525)US Congress Authorizes $3B to Replace Chinese Telecom Gear==========================================================Federal ‘Rip-and-Replace’ Program Gets Funding Boost in Defense Bill [Chris…
-
Apache MINA Vulnerability Let Attackers Execute Remote Code
A new critical vulnerability ([CVE-2024-52046](https://www.cve.org/CVERecord?id=CVE-2024-52046)) has been discovered in Apache MINA, potentially allowing attackers to execute remote code by exploiting…
-
Top 5 Notable Cyber Attacks in December 2024
The cybersecurity research team at ANY.RUN, leveraging their Interactive Sandbox and Threat Intelligence Lookup tools, has uncovered and analyzed a…
-
Nearly half a million people had data stolen after cyberattack on American Addiction Centers
![american addiction centers](https://cms.therecord.media/uploads/format_webp/small_american_addiction_centers_dac2fe836b.jpg?w=3840) [Jonathan Greig](/author/jonathan-greig)December 26th, 2024 Nearly half a million people had data stolen after cyberattack on American Addiction…