Aggregator
Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials
Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated by the notorious hacker group Storm-1575, also known as “Dadsec.” Since September 2023, this group has been leveraging a Phishing-as-a-Service (PhaaS) platform called Tycoon2FA to target Microsoft 365 users, aiming to harvest credentials through meticulously crafted phishing pages. This campaign, active […]
The post Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2007-2428 | Ahhp-Portal page.php sc code injection (EDB-29903 / XFDB-34443)
CVE-2000-0061 | Microsoft Internet Explorer 4.0/4.0.1/5.0/5.0.1 Security Zone privileges management (EDB-19719 / BID-923)
CVE-2007-6614 | Agares Media phpAutoVideo 2.21 frontpage_right.php loadadminpage code injection (EDB-4782 / BID-27023)
Sustaining Digital Certificate Security - Upcoming Changes to the Chrome Root Store
HPE security advisory (AV25-303)
Cybersecurity Firm SentinelOne Suffers Major Outage
Cybersecurity vendor SentinelOne suffered a major, global outage for about six hours on Thursday that disrupted its monitoring of managed response service customers' endpoints and networks, interrupted software updates and kept administrators from accessing consoles for troubleshooting purposes.
BSidesLV24 – PasswordsCon – Cloud Attack: Dissecting Attack Paths With Graph-Mode
Author/Presenter: Filipi Pires
Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel.
The post BSidesLV24 – PasswordsCon – Cloud Attack: Dissecting Attack Paths With Graph-Mode appeared first on Security Boulevard.
Detecting Deepfake Threats in Authentication and Verification Systems
As digital transformation accelerates, the integrity of authentication and verification systems faces an unprecedented challenge: hyper-realistic deepfakes. These AI-generated forgeries, which manipulate faces, voices, and documents, have evolved from niche curiosities to sophisticated tools for bypassing security protocols. By mid-2025, the global financial sector reported a 393% year-over-year increase in deepfake-enabled phishing attacks, with losses […]
The post Detecting Deepfake Threats in Authentication and Verification Systems appeared first on Cyber Security News.