Latest security news
- The many variants of the ClickFix social engineering tactic
- LockBit Ransomware Hacked, Insider Secrets Exposed
- Yet another SonicWall SMA100 vulnerability exploited in the wild (CVE-2025-32819)
- Just 5% of Enterprises Have Deployed Quantum-Safe Encryption
- UK Cyber Essentials Certification Numbers Falling Short
- UK Launches New Cybersecurity Assessment Initiatives to Drive Secure by Design
- Confusion Reigns as Threat Actors Exploit Samsung MagicInfo Flaw
- #Infosec2025: Combating Deepfake Threats at the Age of AI Agents
- Cisco’s new chip wants to scale quantum computing faster
- Hacker Finds New Technique to Bypass SentinelOne EDR Solution
- How agentic AI and non-human identities are transforming cybersecurity
- Even the best safeguards can’t stop LLMs from being fooled
- Wave of tech layoffs leads to more job scams
- Global cybersecurity readiness remains critically low
- Inferno Drainer Returns, Stealing Millions from Crypto Wallets
- "Nationally Significant" Cyber-Attacks Have Doubled, UK’s NCSC Reports
- DDoS-for-Hire Network Dismantled in International Operation
- Passkeys Set to Protect GOV.UK Accounts Against Cyber-Attacks
As new malware delivery campaigns using the ClickFix social engineering tactic are spotted nearly every month, it’s interesting to see how the various attackers are trying to refine the two main elements: the lure and the “instruction” page. In the latest email campaigns documented by the Google Threat Intelligence Group, the suspected Russian threat actor tried to trick the targets into downloading malware by urging them to “solve” a fake CAPTCHA page and then press …
(C) Do-Know.com (http://do-know.com/). Do not copy without permission from info at do-know.com.