Threat Advisories:
Highlights of Our CISO Dinner
Upgrading struggling vulnerability management programs to Threat Exposure Management, with Host, CISO Al Lindseth formerly from Plains All American Pipeline and PWC - 6 minute podcast
0:00
0:00
👥 Play Count: Loading...

Surging JavaScript Threats Steal Your Secrets

Threat Level – Amber | Vulnerability Report
Download PDF

The threat actors utilize malicious JavaScript samples, taking advantage of popular survey sites, low-quality hosting, and web chat APIs to steal sensitive information. They create chatbots registered under notable figures, like an Australian footballer, in specific campaigns. Additionally, these actors employ various tactics, including injecting web skimmers into compromised sites and setting up traditional phishing sites, to execute their malware campaigns.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox