Email:

Phone No.

Whatsapp

Blog

Serpent Malware Campaign Abuses Chocolatey Windows Package Manager
Serpent Malware Campaign Abuses Chocolatey Windows Package Manager
Serpent Malware Campaign Abuses Chocolatey Windows Package Manager
Serpent Malware Campaign Abuses Chocolatey Windows Package Manager

Serpent Malware Campaign Abuses Chocolatey Windows Package Manager

Serpent Malware Campaign Abuses Chocolatey Windows Package Manager Threat actors are abusing the popular Chocolatey Windows package manager in a new phishing campaign to install new ‘Serpent’ backdoor malware on systems of French government agencies and large construction firms. Chocolatey is an open-source package manager for Windows that allows users to install and manage over

Microsoft Investigating Claims of Hacked Source Code Repositories

Microsoft Investigating Claims of Hacked Source Code Repositories Microsoft says they are investigating claims that the Lapsus$ data extortion hacking group breached their internal Azure DevOps source code repositories and stolen data. Unlike many extortion groups we read about today, Lapsus$ does not deploy ransomware on their victim’s devices. Instead, they target the source code

On bank phishing scams: What banking institutions do to reduce them

On bank phishing scams: What banking institutions do to reduce them Singapore is tightening security steps to reinforce the local banking and communications infrastructures, including the need for SMS service providers to check against a registry before sending messages. Banks are also expected to develop “more adaptable” artificial intelligence (AI) programs to detect illicit transactions. The enhanced

New Phishing Toolkit Lets Anyone Create Fake Chrome Browser Windows

A phishing kit has been released that allows red teamers and wannabe cybercriminals to create effective single sign-on phishing login forms using fake Chrome browser windows. When signing into websites, it is common to see the option to sign with Google, Microsoft, Apple, Twitter, or even Steam. For example, the login form for DropBox allows

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us