Ahmed El-Tantawy

More iOS Zero-Days, More Mercenary Spyware — This Time: Cytrox Predator

Apple Scrambled to Fix 3 More CVEs: Egyptian opposition presidential candidate Ahmed Eltantawy targeted “by the government ...
Security Boulevard
botnets, DDOS attacks, FBI IPStorm botnet DDoS

Qakbot Takedown Resembles Hack Back, Will Botnet, Malware Be Resurrected?

| | botnet, FBI, Hack back, Malware, Qakbot
Operation 'Duck Hunt' tricked thousands of Qakbot-infected computers into downloading an FBI-made uninstaller. Can it resurrect? Only time will tell ...
Security Boulevard
CISA China Volt Typhoon

China Accuses US of Years of Cyber-Spying, Malware Campaigns

| | china espionage, Microsoft, nsa, spying
The Chinese government is accusing the United States intelligence community of launching cyber-espionage campaigns against the country for years after hacking into Huawei servers as far back as 2009. China’s Ministry of ...
Security Boulevard
Badge identity Teleport auth AI Adoption Lags cloud bias AI identity verification Open Raven

The Battle of the Bots: Safeguarding Identity in the Age of AI

In the age of generative AI, identity is being exploited by attackers as a weakness in the security perimeter. Here's what to do ...
Security Boulevard
Streaming Platforms Advance Gaming Security

Gaming, Financial Services Apps Under Attack

Malicious actors are targeting gaming and FinServ apps developed for both Apple iOS and the Android platform, according to Digital.ai's latest Threat Analytics Report ...
Security Boulevard
Netskope phishing Qakbot DarkGate ransomware

Barracuda Networks Issues Email Inbox Rules Manipulation Warning

A Barracuda report found cybercriminals are becoming more adept at manipulating email inbox rules to hide their tracks after taking over an account ...
Security Boulevard
cybersecurity insurance

Coalition Report Reveals Ransomware Resurgence

A Coalition report showed a a 12% increase in claims made in the first half of this year—driven largely by a spike in ransomware attacks and funds transfer fraud (FTF) ...
Security Boulevard
China cyberespionage

A Wave of Chinese Cyberthreat Campaigns Use Old and New Malware

| | china, cybsercurity, Malware, Phishing
Proofpoint threat researchers are tracking a recent surge in Chinese cyberattacks aimed at Chinese-speaking targets around the globe and that use both older and new malware typically linked to cybercriminals from the ...
Security Boulevard
ransomware RaaS

LockBit Affiliates Use RMM Software in Ransomware Attacks

| | Cybersecurity, MSP RMM, Ransomware
Affiliates of the Russia-linked LockBit ransomware group are using remote monitoring and management (RMM) software to distribute its malicious payload to organizations and their downstream customers and partners. Researchers with cybersecurity firm ...
Security Boulevard
npm packages caught exfiltrating Kubernetes config, SSH keys

npm packages caught exfiltrating Kubernetes config, SSH keys

| | DevZone, Malware Analysis, npm
The Sonatype Security Research team is currently tracking an ongoing campaign on the npm registry that uses npm packages to retrieve and exfiltrate your Kubernetes configuration and SSH keys to an external ...