News & Updates

Researchers Uncover Thriving Phishing Kit Market on Telegram Channels

In yet another sign that Telegram is increasingly becoming a thriving hub for cybercrime, researchers have found that threat actors are using the messaging platform to peddle phishing kits and help set up phishing campaigns.
“To promote their ‘goods,’ phishers create Telegram channels through which they educate their audience about phishing and entertain subscribers with polls like, ‘What type
Cybersecurity Tools

MSI Breach Claimed By Money Message Ransomware Gang

A recent data breach affecting Taiwanese PC parts maker MSI (Micro-Star International) has been listed on the extortion portal of a new ransomware gang known as ‘Money Message’. The threat actors claim to have stolen source code from the company’s network. MSI is one of the most well-known names in the global hardware market, producing […]

The post MSI Breach Claimed By Money Message Ransomware Gang appeared first on Heimdal Security Blog.

News & Updates

Microsoft aims at stopping cybercriminals from using cracked copies of Cobalt Strike

Microsoft announced it has taken legal action to disrupt the illegal use of copies of the post-exploitation tool Cobalt Strike by cybercriminals. Cobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named ‘Beacon’ on the victim machine. The Beacon includes a wealth of functionality for the attacker, including, but […]

The post Microsoft aims at stopping cybercriminals from using cracked copies of Cobalt Strike appeared first on Security Affairs.

Cybersecurity Tools

What Is a Software Restriction Policy?

In today’s digital age, it is crucial for businesses to protect their sensitive data and computer systems from cyber threats. One effective way of doing so is by implementing a software restriction policy. But what exactly is a software restriction policy? And how can it benefit your organization? In this article, we will explore the […]

The post What Is a Software Restriction Policy? appeared first on Heimdal Security Blog.

Scroll to Top