Tag: CTI
-
Click Here! Malvertising and its Effective Manipulation

“WARNING! Your iPhone is infected with virus and immediate urgent action is required!” – this was the pop-up that displayed itself on the face of Andrew Reed’s phone. A pop-up that was invoked because of an unintentional click to a website link that was displayed at the top of Google’s search results for “Cookie Recipes”.… Read more
-
Russia’s Persistent Threat to Cyberspace

Evidence from 2017-2025 Recently, there has been a surprising question circulating: ‘Is Russia a threat to the United States?’ The short answer is yes, and we will explain why—starting with the history of attacks carried out by Russian threat actors. In May 2024, a Russian-linked ransomware attack paralyzed a major U.S. energy provider, plunging thousands… Read more
-
Is DeepSeek Lying to You? Unmasking the AI’s Data Deception

In the world we live in today, where Artificial Intelligence is gaining more prevalence in usage among the average user, trust is a subjective case in which one needs to maintain discipline & cordiality. DeepSeek is an AI platform that originated in China and has obtained a mass following in popularity with people around the… Read more
-
How the Mexican Drug Cartels Relate to Cybersecurity

Mexican drug cartels have adopted the same diversification strategies as successful business moguls like the investors of Shark Tank to safeguard their empires. They have ventured into 21st-century cybercrimes, including phishing, vishing, ransomware, and pig butchering scams. These Mexican cartels utilize both traditional fiat currencies and cryptocurrencies to conduct their illicit activities. The cartels have… Read more
-
Beware of the Toll Lane Fee Text Scam

In an increasingly digital world, scams are becoming more sophisticated and challenging to identify. From Postal Service smishing attacks to IT helpdesk vishing attacks, it has been nearly impossible to keep track of what is real and what is indeed falsified. As the start of the year unfolds, threat actors have rotated slightly to target… Read more
-
Bear in the Cyber Den

RUSSIA’S FANCY BEAR STRIKES AGAIN, AND WHY THIS IS JUST THE BEGINNING In recent months, the cyber threat landscape has been dominated by headlines in the cyber world, talking about a Fancy Bear. You might be asking yourself, “Who is this bear? What makes the bear fancy? Why is there a bear working with computers?”… Read more
-
Let’s Talk About Spyware and Pegasus Sextortion Scams

Before we dive into the sextortion scam that has been the spotlight of discussion since September, let’s cover what spyware and its related symptoms are. Spyware is a malicious software that infiltrates user devices without consent and secretly collects information. There are various types of spyware including Adware, Keyloggers, Trojan Horse Viruses, Rootkits and more.… Read more
-
Cyberattacks and Mobile Devices

There are over 17 billion smartphones in the world today, and that number grows by the day. Thanks to technological progress, there is hardly anyone these days who doesn’t have one mobile phone or an Internet of Things (IoT) device. This is provided by the growing connectivity, but these devices are subject to various security… Read more
-
Cyber Threats and the U.S. Election

As the presidential race is ending, cybercrime revolving around the election is at an all-time high. The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint public service announcement (PSA) cautioning the widespread disinformation being spread by threat actors ahead of the U.S. general election. The announcement focused… Read more
-
Deepfake Frights: Unmasking the Shadows of Digital Deception

October. The month the night grows longer, and spooky whispers fill the air. Your neighbor is masquerading as a world-renowned singer and her husband is living out his football superstar fantasies. October is a spectacle, and maybe it’s time to slip into your costume. Unfortunately, you are not the only one in disguise. In fact,… Read more
