BianLian Cybercrime Group Changes Up Extortion Methods, Warns CISA

CISA urges small and midsized organizations as well as critical infrastructure to implement mitigations immediately to shield themselves from further data exfiltration attacks.

Dark Reading
Data log thefts explode as infostealers gain popularity with cybercriminals

The malware is becoming cheaper and easier for relatively inexperienced cybercriminals to use, and the popularity of working from home and bring your own device (BYOD) policies have led to a surge in opportunities for corporate assets to be infected by personal devices.

SC Media
Threat actor bypasses detection, protections in Microsoft Azure Serial Console

Mandiant says threat group UNC3944 is leveraging SIM swapping attacks to bypass many of the defense and detection methods used in Azure.

SC Media