Categories

  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
  • Our Mission
  • Top Ten Cyber Security Tips
  • Cyber Threat Maps
  • Online Streamers
  • Contact
  • Home
  • Contact
  • Our Mission
  • Top Ten Cyber Security Tips
  • Cyber Threat Maps
  • Online Streamers
#1 Source for Cyber Security News, Reports and Threat Intelligence
Categories
  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
  • Cyber Security Videos
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
Home /
Cyber Security /
Ex-NSA bad-guy hunter listened to Scattered Spider's fake help-desk calls: 'Those guys are good'

Ex-NSA bad-guy hunter listened to Scattered Spider's fake help-desk calls: 'Those guys are good'

May 18, 2025 08:00 pm Cyber Security 198

Plus, Co-op tells The Reg: 'we took early and decisive action' to block the crooks

INTERVIEW  The call came into the help desk at a large US retailer. An employee had been locked out of their corporate accounts. …



Support the originator by clicking the read the rest link below.
hunter listened scattered spider calls those
  • E-Mail
  • Facebook
  • LinkedIn
  • Twitter
  • Google+
  • Pinterest
  • VK
  • WhatsApp
Read The Rest from the original source
go.theregister.com
Russia-Linked SpyPress Malware Exploits Webmails to Spy on Ukraine
Prev
Russia-Linked SpyPress Malware Exploits...
Pavel Durov rejects EU pressure to censor Romanian election content
Next
Pavel Durov rejects EU pressure to censor...

Related News

  • Looks like Aflac is the latest insurance giant snagged in Scattered Spider’s web
    Looks like Aflac is the latest insurance giant...
  • Banana Squad Hides Data-Stealing Malware in Fake GitHub Repositories
    Banana Squad Hides Data-Stealing Malware in...
  • Scammers Insert Fake Support Numbers on Real Apple, Netflix, PayPal Pages
    Scammers Insert Fake Support Numbers on Real...
  • N. Korean Hackers Use PylangGhost Malware in Fake Crypto Job Scam
    N. Korean Hackers Use PylangGhost Malware in...
  • Shifting Gears: India's Government Calls for Financial Cybersecurity Change
    Shifting Gears: India's Government Calls for...
  • Capturing Screenshots Using a Fake Printer
    Capturing Screenshots Using a Fake Printer
  • Clear Calls, Long Battery, Travel-Ready: Sony LinkBuds Fit Are 55% Off
    Clear Calls, Long Battery, Travel-Ready: Sony...
  • Scattered Spider Aims at US Insurers After UK Retail Hit, Google Warns
    Scattered Spider Aims at US Insurers After UK...
  • Scattered Spider has moved from retail to insurance
    Scattered Spider has moved from retail to...
  • Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
    Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
1 Kraken Has Launched the First-Ever Native Staking Service for the Bitcoin Network — Earn Yield Without Leaving the Chain
Kraken Has Launched the First-Ever Native Staking Service for the Bitcoin Network — Earn Yield Without Leaving the Chain
Pavel Durov warns France is experiencing societal collapse
2 Pavel Durov warns France is experiencing societal collapse
MAT is available for trading!
3 MAT is available for trading!
North Korea targets crypto workers with new info-stealing malware
4 North Korea targets crypto workers with new info-stealing...
Smashing Security podcast #422: The curious case of the code copier
5 Smashing Security podcast #422: The curious case of the...

Newsletter

Be in Touch


Current News Sources: 60

Information about Cyber Security and Threat Intelligence should spread as fast as possible. Our goal is to collect these sources and place them all in one area for quick reading. If the information is important to the viewer and they want more information, we forward them to the direct source. The more people talking about cyber security and the more people sharing the information, the better!

If you have a resource that should be added, please let us know via the contact form. We will review the information and get back to you.

  • Incident Response Tool List
  • Blue Team Tool List
  • Privacy Policy
All Rights Reserved #1 Source for Cyber Security News, Reports and Threat Intelligence
Powered By The Internet!!!!