Iranian hackers have spoofed a German modelling agency website in an attempt to gather information about users’ devices, according to cybersecurity firm Unit 42. The spoofed site features manipulated JavaScript code designed to capture visitors’ detailed information, including IP addresses and device-unique hashes. Although full functionality of the campaign, such as malware delivery and credential harvesting, has not yet been fully achieved, it is expected to support such capabilities in the future.

Confused at all the threat group names? You’re not alone. CrowdStrike and Microsoft want to change that
CrowdStrike and Microsoft aim to enhance the cyber industry by standardizing threat group naming conventions, promoting greater clarity and coordination in understanding cyber threats.