icon Book Free Consultation
image

Description

“As cybersecurity leaders, we have to create our message of influence because security is a culture and you need the business to take place and be part of that security culture.”  — Britney Hommertzheim

Britney is right, that's for sure. Cybersecurity has a culture, just like any other culture. This can only be done if companies and top executives know what's going on in the world. And it's our job to make you aware of this. So, what's been going on in the past month?

An attacker only needs to be able to send messages to a victim through Zoom chat over XMPP protocol. The end of the game. Yes, Zoom is what we're talking about. The most important parts of this month's report are how and why this happened, how it has changed things, and what can be done about it.

A group of cybercrooks made hundreds of rubber clones of fingerprints, whose images they copied along with name & Aadhar card from south of Haryana. This news has shocked all of us. How cybercrooks are exploiting others and vulnerable population.

Razor pay were unable to reconcile receipt of ? 7,38,36,192 against 831 transactions.Only to realise that a cyberfraudster is manupulating the authorisation process of payment gateway to authenticate 831 failed transaction. Razor pay attorney has filed the suit & police is looking for the fraudster. Razor pay is ISO 27001, SOC2, PCI DSS certified, yet, this happens. No one is safe oline, we can only harden the security layer.

These are the most important parts of this month's report. Aside from that, you should care about 23 other pieces of news. Another important story is that someone broke into Ferrari's subdomain to make fake NFTs. This month's news comes from many different fields. From the government, to health to airlines. We see that no one is safe online and that all industries are at risk.

To ensure that you get the most out of your read here, we've done all in our power to help you. Distribute this issue to anybody you think would benefit from it, whether they be coworkers, friends, or business partners. We wish you a safe and pleasurable month of online exploration.

I accept the Terms and Conditions

Latest Threatsploit

grid
  • Edition-79
  • March 14

Threatsploit Adversary Report March 2025

Welcome to our March Threatsploit Adversary Report. The world of cybersecurity never stands still. Every month, new threats emerge, targeting businesses, individuals, and critical systems in increasingly creative ways.

grid
  • Edition-78
  • February 10

Threatsploit Adversary Report February 2025

Welcome to our February 2025 edition of the Threatsploit Adversary Report! In this report, we examine the ever-changing landscape of cyber threats, reveal new attack methods, and provide key insights into the latest developments. This is not just another news update; it’s your guide to understanding what’s happening in cybersecurity and staying aware of the evolving risks.

grid
  • Edition-77
  • January 08

Threatsploit Adversary Report January 2025

Welcome to the January 2025 edition of the Threatsploit Adversary Report. In an era of relentless cyber threats, safeguarding digital assets is more critical than ever. This edition sheds light on the latest tactics employed by threat actors.