Tag: Threat Actor
-
Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication
Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication on cryptocurrency exchanges, …
-
New MedusaLocker Ransomware Variant Deployed by Threat Actor
A financially-motivated threat actor has been observed targeting organizations globally with a MedusaLocker ransomware variant, according …
-
Threat Actor Claiming Breach of Gregory’s Foods 400Gb Database
A threat actor has claimed responsibility for breaching Gregory’s Foods, a well-known supplier of frozen bread, bun, and cookie doughs, …
-
Threat Actor Allegedly Claiming Hack of Microsoft Employee’s Device
The threat actor alleges that they successfully infiltrated a Microsoft employee’s device, encrypted all files, and altered the desktop …
-
Threat Actor Allegedly Claiming Breach of Cyepr
A threat actor has allegedly claimed responsibility for breaching Cyepro Solutions, a company known for its cloud solutions tailored to the …
-
Threat Actor Claiming Breach of Coingecko Database, 1.9M Email Address
A threat actor has claimed responsibility for breaching the database of CoinGecko, a leading cryptocurrency data aggregator. The alleged …
-
Threat Actor Claims to Leak 270GB of New York Times Data
An anonymous threat actor has posted what they claim to be 270GB of source code stolen from the New York Times on a popular imageboard …
-
FCC Names and Shames First Robocall Threat Actor
The US telecoms regulator has named a malicious robocall group for the first time, in a bid to help international partners more effectively …
-
Threat Actor Selling INC Ransomware Code for $300,000
A notorious threat actor has decided to sell the INC Ransomware code for an unbelievable $300,000. As a result of this change, the number …
-
Threat Actor Claims Major Europol Data Breach
A well-known threat actor is selling what they claim to be a legitimate trove of highly sensitive internal data stolen from Europol this …
-
XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor
A threat actor quietly spent the last two years integrating themself in the core team of maintainers of XZ Utils, a free software …
-
BianLian Threat Actor Shifts Focus to Extortion-Only Tactics
The BianLian threat actor has been observed shifting toward extortion-only activities, according to recent findings by GuidePoint’s …
●●●