Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

LinkedIn Accounts Under Attack

In recent weeks, the Cyberint research team has observed an alarming emerging trend – an ongoing and successful hacking campaign is targeting LinkedIn accounts, all following a consistent method. This campaign is currently affecting individuals worldwide, resulting in a significant number of victims losing access to their accounts. Some have even been pressured into paying a ransom to regain control or faced with the permanent deletion of their accounts.

DDoS Empire Shutdown: The Why, What, When & How

Starting from the beginning of 2023, the FBI and other law enforcement agencies worldwide have come together in a united effort to combat cybercrime, with a specific focus on ransomware. This alliance has already resulted in significant arrests, including those of individuals associated with Pompompurin and LockBit, as well as the dismantling of the Hive ransomware group’s infrastructure.

Behind the Mask of Anonymous Sudan: An Analysis

Anonymous Sudan is a rapidly expanding and influential group of hacktivists that identify themselves as Sudanese, motivated by both religious and political beliefs. Since January 2023, they have been carrying out distributed denial-of-service (DoS) attacks, allegedly motivated by defending Islam against Western nations. These attacks have disrupted critical infrastructure and various global sectors, including finance and healthcare.

Neo_Net: Decoding the Reign of a Cybercrime Mastermind

Following research on a notorious cybercrime mastermind known as Neo_Net, Cyberint has unveiled the extent of the threat actor’s activities, who primarily targets Spanish and Chilean banks. The findings indicate that the mastermind’s crimes have now expanded into multiple countries and industries worldwide. Further analysis reveals that Neo_Net has not only focused on targeting Financial Applications through the creation of fake Android applications, but has also expanded its schemes.

Securing Voice Authentication in the Deepfake Era

Voice authentication is a biometric security method that verifies individuals based on their unique vocal characteristics. It has become increasingly popular in various applications, ranging from phone banking to smart home devices. However, the rise of deepfake technology poses a significant threat to the integrity of voice authentication systems. Deepfakes are highly realistic artificial audio clips that can be used to impersonate someone else’s voice.

Phishing Alert: Don't Fall for Barbie Movie Scams

The Barbie movie has captivated audiences worldwide, breaking box-office records and generating massive excitement and enthusiasm among fans. However, as with any major news sensation, threat actors are quick to exploit the fervor surrounding the movie for their malicious gain. The Barbie movie, given its immense popularity, has become an ideal bait for cybercriminals seeking to exploit the frenzy around it.

Why 2023 Requires a New Approach to Dark Web Monitoring

Dark Web monitoring strategies need to evolve. Gone are the days when the Dark Web was a haven mostly only for people who wanted to post illicit content anonymously. Today, the Dark Web has expanded into a hotbed for threat actors, who use Dark Web forums and apps to distribute malware and sell the fruits of their hacking activities.

SiegedSec Compromise NATO

As part of their campaign against the West, SiegedSec announced of their successful attack on NATO and leaking some valuable documents. The leak, as the group stated, included hundreds of sensitive documents from NATO’s COI portal, which were meant exclusively for NATO countries and partners. SiegedSec claims that their motive behind the attack is NATO’s alleged infringement on human rights.

SIM Swapping Attacks Unmasked: Stay One Step Ahead

The digital landscape has become an integral part of our daily lives. However, with the convenience and connectivity offered by digital platforms comes an increased risk of cyber threats. One such threat that’s gained prominence in recent years is SIM swapping attacks. SIM swapping attacks involve a threat actor fraudulently gaining control over an individual’s mobile phone number. This ultimately allows the attacker to hijack their digital identity.

Better Together: How Cyware & Cyberint Pair Threat Intelligence & Automation

Mature cybersecurity programs require strategic, operational, and tactical threat intelligence, as well as structured ways to ingest, consume, and act on the relevant threat intel data. To help organizations better achieve these goals, Cyware and Cyberint have established a partnership and out-of-the-box integration.