Please turn JavaScript on
Security Risk Advisors icon

Security Risk Advisors

follow.it gives you an easy way to subscribe to Security Risk Advisors's news feed! Click on Follow below and we deliver the updates you want via email, phone or you can read them here on the website on your own news page.

You can also unsubscribe anytime painlessly. You can even combine feeds from Security Risk Advisors with other site's feeds!

Title: A Leader in Cybersecurity Services - Security Risk Advisors

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  2.27 / day

Message History

Threat actor groups such as Akira Ransomware, Curly COMrades, and UNC3886 have been observed abusing native Windows Hyper-V virtualization features to create hidden Virtual Machines (VM), establishing covert, long term operations that include the adversary performing internal reconnaissa...


Read full story

Security researchers reported that publicly released Nightmare-Eclipse tooling, specifically BlueHammer, RedSun, and UnDefend, has transitioned from proof-of-concept (PoC) exploits into active intrusion scenarios. The observed attack involved likely initial access through compromised FortiGate SSL VPN credentials, followed by execution of pr...


Read full story

Trend Micro reported on a campaign by Void Dokkaebi (Famous Chollima) that transforms compromised developer repositories into malware distribution channels, creating a worm-like supply chain attack. The campaign begins with fake job interview lures, where developers are tricked into cloning and executing malicious code repositories hosted on...


Read full story

ANY.RUN reported on a new campaign attributed to the Lazarus Group leveraging a macOS malware kit dubbed “Mach-O Man.” The operation uses social engineering through platforms like Telegram to impersonate legitimate business contacts and lure victims into fake meeting scenarios. Instead of exploiting vulnerabilities, attackers rely on user in...


Read full story

Microsoft reported on a human-operated intrusion campaign leveraging Microsoft Teams to impersonate IT/helpdesk personnel and trick users into granting remote access. Unlike traditional phishing, the attack uses enterprise collaboration channels, making the interaction appear legitimate and lowering user suspicion. The attack begins with ext...


Read full story