Tag: EN

Please Don’t Feed the Scattered Lapsus ShinyHunters

A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journalists and regulators……

ShinyHunters Leads Surge in Vishing Attacks to Steal SaaS Data

Several threat clusters are using vishing in extortion campaigns that include tactics that are consistent with those used by high-profile threat group ShinyHunters. They are stealing SSO and MFA credentials to access companies’ environments and steal data from cloud applications,…

Please Don’t Feed the Scattered Lapsus Shiny Hunters

A prolific data ransom gang that calls itself Scattered Lapsus Shiny Hunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journalists and……

Notepad++ Update Servers Hijacked in Targeted Supply Chain Attack

Attackers hijacked Notepad++ update servers to selectively deliver trojanized installers through a trusted update channel. The post Notepad++ Update Servers Hijacked in Targeted Supply Chain Attack appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…

ShinyHunters flip the script on MFA in new data theft attacks

Multi-factor authentication (MFA) is supposed to defend against phishing attacks, but threat actors operating under the ShinyHunters banner are using it as a pretext in ongoing social engineering attacks aimed at bypassing it. Among those successfully targeted in these latest…

WhatsApp Launches High-Security Mode for Ultimate User Protection

  WhatsApp has launched a new high-security mode called “Strict Account Settings,” providing users with enhanced defenses against sophisticated cyber threats. This feature, introduced on January 27, 2026, allows one-click activation and builds on the platform’s existing end-to-end encryption. It…