Israel’s cyber defense chief, Gaby Portnoy, has expressed significant concerns to CNN about the potential escalation of Iranian cyberattacks. This apprehension comes in the wake of a series of suspected…
Author: Endpoint Magazine
The Scarred Manticore: A Deep Dive into Iran’s Espionage Campaign in the Middle East
Scarred Manticore, a notable force within the cyber espionage landscape, is an Iranian threat group closely linked to the Ministry of Intelligence and Security (MOIS) that has been skillfully conducting…
Cybersecurity Frontlines: Unraveling the October Cyberattacks on Israel by Iran’s Imperial Kitten
Last month, a series of sophisticated cyber operations targeted Israel’s transportation, logistics, and technology sectors. The orchestrator of these attacks, as identified by Crowdstrike, is none other than Imperial Kitten,…
Deciphering Digital DNA: Tracing Hamas’s Cyber Footprint to Iranian-Linked TAG-63 Operations
Recorded Future’s Insikt Group recently discovered a malicious application disseminated through a Telegram channel used by supporters of the Hamas organization. The tool, designed to communicate with the Izz ad-Din…
Iran’s Escalating Cyber Threat: Sophistication and Global Reach
Cyberspace, a domain where shadows loom large, sees the demarcation between sovereign defense and global steadiness frequently veiled by the crafty digital exploits of state-backed agents. The 2023 Microsoft Digital…
Cybersecurity in Conflict: The Rules of Digital Engagement
Digital technology’s transformative influence on modern warfare has caught the International Committee of the Red Cross’s (ICRC) attention, spotlighting a troubling development: Civilians, once mere spectators of distant battlefields, are…
Cyber Warfare Intensifies Amidst Israel-Palestine Conflict: A Surge in Hacktivism
In the ongoing conflict between Israel and the Palestinian terrorist group Hamas, a new front has emerged: cyberspace. Hacktivists from across the globe have engaged in the fray, reminiscent of…
The New Frontier of Digital Warfare: How China’s Influence Campaigns are Evolving to Target U.S. Elections
A recent threat analysis report by Microsoft has shed light on a concerning trend: Chinese state-aligned influence and disinformation campaigns are not only becoming more sophisticated but are also successfully…
How to Recognize and Remove Browser Hijackers: An Endpoint Guide
Browser hijackers are a form of cyberattack that can redirect your web searches and inject unwanted ads, often with malware, into yor web browser. While they may not be as…
The Rise of Infamous Chisel Mobile Malware: What You Need to Know
The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with international counterparts, have identified a new type of malevolent mobile malware called “Infamous Chisel.” This malware has been wreaking havoc…