Free webmail domains accounted for 72% of BEC attacks

Free webmail domains accounted for 72% of BEC attacks

Phishing threats were analyzed in a recent report by APWG.  According to the report, fraudsters are increasingly calling potential victims directly, and luring them with text messages that may contain a phone number for the targeted subscriber to call. These phone-based methods are more immediate, and allow fraudsters to talk victims out of their sensitive […]

Progress Software releases patch for critical vulnerability

Progress Software has released an emergency fix to address a vulnerability affecting its LoadMaster and LoadMaster Multi-Tenant (MT) Hypervisor products. This vulnerability, known as CVE-2024-7591, is classified as a critical security issue. The vulnerability involves improper input validation, which could potentially allow unauthenticated, remote attackers to access the LoadMaster management interface. Insights from Security Experts […]

Just 5% of Business Leaders Experience Seamless Connectivity

A survey of 500 enterprise leaders across six countries (United States, United Kingdom, Germany, Japan, Canada and Australia) highlights the relationship between connectivity and cybersecurity. The research asserts that better connectivity improves an organization’s chances of defending against cyberattacks, as 38% of organizations with excellent connectivity are among industry leaders for cybersecurity performance. When an […]

Lowe’s workers subjected to malicious advertising scheme

Reports have uncovered a malvertising campaign directed at Lowe’s employees. This campaign, utilizing Google ads, aims to gain access to current and former employee credentials. The deceptive Google ads show up when searching for Lowe’s internal HR portal, MyLowesLife. The URLs of these ads closely resemble the legitimate HR portal website, potentially tricking users into […]

Avis Rent A Car reveals data breach

On early September, 2024, Avis Rent A Car System disclosed a data breach. During the period of August 3 to 6, 2024, an unauthorized third party managed to access one of Avis’s business applications and obtained customer information. Customers were recently notified by Avis that the breach may have led to the theft of the […]

5.3 terabytes of patient information in Confidant Health database leaked

A cybersecurity researcher discovered an exposed Confidant Health database containing thousands of records such as personal identifiable information, psychosocial assessment documents, health insurance information, ID cards, and more. In total, the database contained 126,276 files (equivalent of 5.3 terabytes). A separate folder contained 1,755,571 logging records. Some of these files contain audio and video files.  […]

BlackByte ransomware exploits vulnerability in VMware ESXi

The BlackByte ransomware group typically employs tactics that use vulnerable drivers to avoid security measures in order to deploy a self-spreading ransomware encryptor. However, recent investigations by Talos IR show that BlackByte is using different techniques than usual. BlackByte was seen exploiting a vulnerability in VMware ESXi (CVE-2024-37085) to bypass authentication. Darren Guccione, CEO and […]

Ransomware Groups Saw a 56% Increase in H1 2024

Ransomware threats were analyzed in a recent report by Searchlight Cyber. The report shows how one of the biggest ransomware groups (BlackCat) ceased operations, a new gang (RansomHub) emerged in February and quickly established itself as the third most prolific ransomware group, and outlines the effects of devastating attacks executed against organizations. Other highlights of […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC