Email:

Phone No.

Whatsapp

Blog

Devious Phishing Method Bypasses MFA Using Remote Access Software
Devious Phishing Method Bypasses MFA Using Remote Access Software
Devious Phishing Method Bypasses MFA Using Remote Access Software
Devious Phishing Method Bypasses MFA Using Remote Access Software

Devious Phishing Method Bypasses MFA Using Remote Access Software

Devious Phishing Method Bypasses MFA Using Remote Access Software A devious, new phishing technique allows adversaries to bypass multi-factor authentication (MFA) by secretly having victims log into their accounts directly on attacker-controlled servers using the VNC screen sharing system. One of the biggest obstacles to successful phishing attacks is bypassing multi-factor authentication (MFA) configured on

Google Chrome to Allow Users to Add Notes to Saved Passwords

Google Chrome to Allow Users to Add Notes to Saved Passwords Google is testing a new Chrome feature that allows users to add notes on passwords saved in the web browser. The new feature was spotted by a Reddit user (u/Leopeva64-2) on Google Chrome Canary (version 101), which is an experimental future version three releases

Vulnerable Microsoft SQL Servers Targeted with Cobalt Strike

Vulnerable Microsoft SQL Servers Targeted with Cobalt Strike Threat analysts have observed a new wave of attacks installing Cobalt Strike beacons on vulnerable Microsoft SQL Servers, leading to deeper infiltration and subsequent malware infections. MS-SQL Server is a popular database management system powering large internet applications to small single-system applets. However, many of these deployments aren’t adequately

Police Bust Phishing Group that Used 40 Sites to Steal Credit Cards

Police Bust Phishing Group that Used 40 Sites to Steal Credit Cards The Ukrainian cyberpolice have arrested a group of phishing actors who managed to steal payment card data from at least 70,000 people after luring them to fake mobile service top up sites. According to the announcement from law enforcement, the actors used the stolen information

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us