
A new malvertising campaign is targeting businesses by hijacking Google Ads accounts to run fraudulent ads. Attackers are using deceptive ads that lead to fake login pages, where they steal two-factor authentication (2FA) codes and credentials. This ongoing campaign has been described as a significant threat to advertisers, as it allows cybercriminals to exploit compromised accounts for malicious purposes. Reports indicate that the situation is evolving, with new phishing techniques, including the 'Sneaky 2FA' kit, which aims to bypass 2FA protections on Microsoft 365 accounts. The campaign is part of a broader trend of increasing cyber threats, with various vulnerabilities being exploited, including CVE-2024-7344, which affects UEFI systems and has been linked to unauthorized access. Experts urge businesses to remain vigilant against these sophisticated attacks.
Microsoft finally patched the security threat (CVE-2024-7344), allowing bad actors to gain unauthorized access to Windows 11 by bypassing Secure Boot for over 7 months. https://t.co/Ab4Y3s8bGX šŖ²
PATCH NOW: A critical code execution flaw in the Aviatrix Controller with a 10.0 CVSS score has been exploited in the wild, resulting in cryptojacking and backdoor deployment, according to @wiz_io research. #cybersecurity #infosec #ITsecurity https://t.co/V1SqGTsqkS
By me @Forbes: @Yubico confirms 2FA bypass vulnerability impacting PAM. What you need to know about CVE-2025-23013. #infosec https://t.co/9m8pNZBZZ7