❌

Reading view

There are new articles available, click to refresh the page.

Europol, Microsoft, TrendAIβ„’ and Collaborators Halt Tycoon 2FA Operations

Tycoon 2FA was dismantled this week by law enforcement and industry partners including TrendAIβ„’. The phishing-as-a-service platform offered MFA bypass services using adversary-in-the-middle (AitM) proxying.

Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations

In this blog entry, we discuss how North Korea's significant role in cybercrime – including campaigns attributed to Void Dokkaebi – is facilitated by extensive use of anonymization networks and the use of Russian IP ranges.

Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks

APT group Earth Koshchei, suspected to be sponsored by the SVR, executed a large-scale rogue RDP campaign using spear-phishing emails, red team tools, and sophisticated anonymization techniques to target high-profile sectors.

The Road to Agentic AI: Exposed Foundations

Our research into Retrieval Augmented Generation (RAG) systems uncovered at least 80 unprotected servers. We highlight this problem, which can lead to potential data loss and unauthorized access.

❌