threat

  • Blog

    The Iran cyber threat: Breaking down attack tactics

    The Iran cyber threat often comes last when mentioned alongside the other so-called “CRINK” attackers, China, Russia, and North Korea. But the risk posed by the country is growing fast, evolving from simple website defacement to attacks on critical national infrastructure (CNI) and more recently, significant US election interference. In August, US intelligence officials confirmed that Iran was behind a…

    Read More »
  • Blog

    Cyber workforce growth slows as tight budgets hit hiring targets — and it’s going to create a more dangerous threat landscape and send burnout through the roof

    Growth of the global cybersecurity workforce has slowed for the first time in six years, according to new research, while cyber threats show no signs of slowing. ISC2’s Cybersecurity Workforce Study found the global workforce amounted to 5.5 million people, marking a 0.1% year on year increase, whereas the labor pool had grown by as much as 8.7% year on…

    Read More »
  • Blog

    Threat Actors Exploit Microsoft Sway to Host QR Code Phishing Campaigns

    A new report from cybersecurity company Netskope reveals details about attack campaigns abusing Microsoft Sway and CloudFlare Turnstile and leveraging QR codes to trick users into providing their Microsoft Office credentials to the phishing platform. These campaigns have targeted victims in Asia and North America across multiple segments led by technology, manufacturing, and finance. What is quishing? QR codes are…

    Read More »
  • Blog

    Microsoft issues warning over potent malware strain developed by Iranian threat actor

    Microsoft has published information on a highly concerning malware campaign being carried out by suspected Iranian state-backed threat group, Peach Sandstorm. Between April and July 2024, Microsoft’s threat intelligence arm observed the collective deploying a newly developed custom multi-stage backdoor, which it has dubbed Tickler. The malware has been used to target businesses operating in the satellite, communications equipment, oil…

    Read More »
  • Blog

    A Growing Threat to Australia’s Renewable Energy Efforts

    Australia is on a mission to become a more energy-efficient nation. The Australian Renewable Energy Agency recently announced a $100 million initiative to explore and expand solar energy capabilities. Further investments in energy storage, pumped hydro, and low-carbon grids may prove just as significant. However, the nation must also address an underlying challenge: the integration of robust IT and software…

    Read More »
  • Blog

    Threat Actors Increasingly Target macOS

    Intel471’s new report reveals macOS is increasingly targeted by threat actors, who develop specific malware for the operating system or use cross-platform languages to achieve their goals on macOS computers. More macOS vulnerabilities are also being exploited in the wild. Malware and exploits might be used for both cybercrime and cyberespionage. More malware than ever on macOS Between January 2023…

    Read More »
  • Blog

    Why attacks against critical national infrastructure (CNI) are such a threat

    One of the most prized targets for threat actors is critical national infrastructure (CNI), systems that are vital to the functioning of an entire country and which keep the world economy afloat. This includes energy grids, telecommunications networks, and water infrastructure, all of which must face down the ever-present threat of devastating cyber attacks. UK and US authorities recently warned…

    Read More »
  • Blog

    Home Office confirms Russian threat actors accessed emails after Microsoft hack

    The Russian hacking group Midnight Blizzard breached the UK Home Office and stole sensitive data as part of the hacking campaign revealed earlier this year. Freedom of Information (FoI) requests from Recorded Future News indicate that the Russia-backed hacking group was able to access corporate emails and data shared with Microsoft. The Home Office said its own systems weren’t affected,…

    Read More »
Back to top button
close