To defend “target rich, resource poor” critical infrastructure from cyberattacks, the U.S. must expand its patchwork volunteer system, a new report concludes.| CyberScoop
North Korean hackers used deepfake Zoom calls and Telegram links to infect Mac systems at a crypto firm.| The Hacker News
Malware campaign hijacks expired Discord invite links to steal crypto wallets and infect users globally.| The Hacker News
Based on observations from our 2024 incident response cases, an MFA bypass technique called token theft attacks are gaining steam. Learn more here.| FRSecure