Sneaky Log Phishing Scheme Targets Two-Factor Security

Sneaky Log Phishing Scheme Targets Two-Factor Security

Security researchers at French firm Sekoia detected a new phishing-as-a-service kit targeting Microsoft 365 accounts in December 2024, the company announced on Jan. 16. The kit, called Sneaky 2FA, was distributed through Telegram by the threat actor service Sneaky Log. It is associated with about 100 domains and has been active since at least October 2024. Sneaky 2FA is an adversary-in-the-middle attack, meaning it intercepts information sent between two devices: in this case, a device…

Read More

RATs in the tunnel: Uncovering the cyber underworld.

RATs in the tunnel: Uncovering the cyber underworld.

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks.  Being a security researcher is…

Read More

Best Secure Access Service Edge Platforms in 2024 | TechRepublic

Best Secure Access Service Edge Platforms in 2024 | TechRepublic

The rise of remote work, cloud adoption, and the increasing complexity of cyber threats have forced many organizations to reconsider their network security approach. The secure access service edge (SASE) is one of the best approaches, as it offers a unified network and security framework through the integration of SD-WAN and cloud-native security features, such as secure web gateway, cloud access security brokers, firewall-as-a-service and zero trust. These ensure that modern organizations have scalable, agile…

Read More