Resurgence of Vacation Request-Themed Phishing

On May 23, 2023, Cofense researchers reported a phishing campaign with threat actors leveraging paid time off (PTO) and vacation requests as a lure theme. Context The report is based on a Phishing Defence Center (PDC)-reported a phishing campaign where threat actors sent emails to users claiming to be from ‘HR Departments’ and providing the users with links…

Read More

Careers in Cybersecurity

With cybersecurity being a flourishing industry with promising job opportunities, recent college graduates may have their sights set on a career in cyber threat intelligence. The notion that graduates must obtain a degree in computer science, computer programming, or machine learning to land a career in cybersecurity is no longer the case. Many skills developed…

Read More

New RaaS CryptNet Advertised for Double Extortion Attacks in Dark Web Forums

Context On May 16, 2023, ZScaler threat researchers reported the technical details of a new ransomware-as-a-service (RaaS) operation they’ve observed being advertised on dark web forums. ZScaler researchers provided the following key takeaways: CryptNet is a new ransomware-as-a-service that has been advertised in underground forums since at least April 2023 The CryptNet threat group claims…

Read More

Join PCI SSC as an Associate Participating Organization

As a retailer or hospitality professional, we know that it is important to you to ensure that you are securing payment data effectively for your customers and for your business. It is also important for you to have a voice when it comes to the future of securing payment data through the ongoing development of…

Read More

Researchers Publish Separate POC for PaperCut CVE that Reportedly Bypasses Current Detection

Context On May 4, 2023, VulnCheck researchers released a proof-of-concept (POC) exploit for CVE-2023-27350. According to the report, the exploit bypasses current detection options for attacks leveraging the vulnerability. Technical Details According to NIST, CVE-2023-27350 “allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to…

Read More