How Hive0154 (Mustang Panda) Uses Geopolitical Lures to Target the Tibetan Community: What You Need to Know
|

How Hive0154 (Mustang Panda) Uses Geopolitical Lures to Target the Tibetan Community: What You Need to Know

Imagine opening an email that looks like it’s from a trusted Tibetan organization—maybe it contains an official-looking document about the Dalai Lama’s upcoming milestone birthday or a hot-button issue in Tibetan education policy. But with a single click, you’ve unwittingly invited a stealthy cyberespionage group into your computer—one known to operate on behalf of Chinese…

New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains
|

New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains

In the ever-evolving landscape of cybersecurity, threat actors are constantly on the lookout for innovative methods to bypass security protocols and exploit vulnerabilities. One such method has been observed in a new malware campaign, codenamed SERPENTINE#CLOUD by Securonix. This campaign employs Cloudflare Tunnel subdomains to host malicious payloads and deliver them via phishing chains. In…

tax fraud
| | | |

Beware of Tax Season Phishing Scams: Insights from Microsoft’s Observations

Introduction to Tax Season Threats As tax season approaches in the United States, the threat of phishing scams escalates significantly. During this period, threat actors employ various social engineering tactics, primarily using tax-related themes in their schemes to deceive unsuspecting individuals. These cybercriminals craft messages that are often designed to resemble legitimate communications from tax…