Aggregator
Iran-Nexus Hackers Impersonate Omani MFA to Target Governments Entities
Cybersecurity researchers uncovered a sophisticated, Iran-linked spear-phishing operation that exploited a compromised Ministry of Foreign Affairs (MFA) mailbox in Oman to deliver malicious payloads to government entities worldwide. Analysts attribute the operation to the “Homeland Justice” group, believed to be aligned with Iran’s Ministry of Intelligence and Security (MOIS). Leveraging stolen diplomatic communications, encoded macros, […]
The post Iran-Nexus Hackers Impersonate Omani MFA to Target Governments Entities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Blast Radius of Salesloft Drift Attacks Remains Uncertain
CVE-2024-2240 | Brocade SANnav up to 2.3.1a Docker Daemon unnecessary privileges (WID-SEC-2025-0367)
CVE-2024-4282 | Brocade SANnav up to 2.3.1a SSH risky encryption (WID-SEC-2025-0367)
Tycoon Phishing Kit Employs New Technique to Hide Malicious Links
Cybercriminals are deploying increasingly sophisticated methods to bypass security systems, with the latest threat emerging from the advanced Tycoon phishing-as-a-service kit. This malicious platform has introduced novel techniques designed to obscure dangerous links, making them nearly invisible to traditional detection systems while maintaining their effectiveness against unsuspecting victims. The Tycoon phishing kit represents a significant […]
The post Tycoon Phishing Kit Employs New Technique to Hide Malicious Links appeared first on Cyber Security News.
Москва, осень, эксперимент. ИИ будет решать, достаточно ли вы взрослы для покупки водки
美国失业人数超过招聘人数
Ukraine’s cyber chief on Russian hackers’ shifting tactics, US cyber aid
Pear
You must login to view this content
Pear
You must login to view this content
New TP-Link zero-day surfaces as CISA warns other flaws are exploited
Вредоносы, VPN и поддельная дипломатия. Раскрыта схема масштабной кибератаки Ирана на государственные структуры мира
Breach Highlights AI and API Vulnerabilities in Software Supply Chains
【资料】朝鲜的导弹发展历史
SecWiki News 2025-09-04 Review
LLM-TIKG: 利用大语言模型构建威胁情报知识图谱 by ourren
从真实网络空间的角度评价一下《从网络空间看伊朗断网事件》 by ourren
欧洲学者分析AI大模型在网络安全自动化领域的应用前景 by ourren
更多最新文章,请访问SecWiki