Nearly 4 out of 5 organizations plan to boost ransomware protection efforts

March Madness Can Be Used by Cybercriminals as a Ploy for Attacks

Malicious actors often exploit major events to target the general public. Events that attract a large audience can be used as a platform to distribute malicious emails, links, and other forms of communication. As March Madness approaches, security leaders advise organizations to educate their employees about the potential risks associated with phishing campaigns and scams. […]

67% of businesses transfer passwords from on-premises to cloud environments

New research by Silverfort has uncovered that a majority of businesses synchronize on-premises passwords with cloud environments, compromising the security of the cloud setup. This migration of on-premises vulnerabilities to the cloud environment creates a loophole that malicious actors can exploit. As organizations increasingly transition to cloud environments over the past decade, many have failed […]

A recent discovery: A new, advanced phishing platform as a service

According to researchers at Netcraft, a new phishing-as-a-service platform called darcula has been discovered. This platform, operating on over 20,000 phishing domains, provides cybercriminals with access to phishing templates and simplifies the deployment of phishing sites. Unlike other similar platforms, darcula has the ability to update in place, allowing for the incorporation of new features […]

Disruptive cyberattacks pose a threat to critical infrastructure

A recent letter from the White House states that critical infrastructure, specifically water and wastewater systems, is a major target for foreign state-sponsored threat actors. In this letter, the White House requested the cooperation of governors and invited state environmental, homeland security, and health agencies to a meeting to discuss the cybersecurity of the nation’s […]

Adding to Chrome: Part 3 – Discoveries and Suggestions

In the first two installments of this blog series (Part 1 and Part 2), we explored some high-level concepts related to browser extensions and their security implications and then how we went about analyzing them. In this third blog we explore some of our findings and general recommendations on whether or not you should click […]

Uncovering the Phemedrone Stealer: Analyzing the Threat and Detection Methods

Recently, the cybersecurity world has been abuzz with discussions about Phemedrone, a newly emerged stealer exploiting the CVE-2023-36025 vulnerability in Microsoft Windows Defender SmartScreen. The project was most recently available on GitHub; however, the project was taken down, and the associated account was removed. Active development still occurs via Telegram. Phemedrone distinguishes itself as a […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC