phishing

Is the cybersecurity community’s obsession with compliance counter-productive?

Is the cybersecurity community’s obsession with compliance counter-productive? 29/08/2023 at 07:01 By Help Net Security Does anyone think the chances of surviving a plane crash increase if our tray tables are locked and our carry-on bags are completely stowed under our seats? That we’ll be OK if the plane hits a mountain if we have […]

React to this headline:

Loading spinner

Is the cybersecurity community’s obsession with compliance counter-productive? Read More »

Kroll SIM-swap attack: FTX, BlockFi and Genesis clients’ info exposed

Kroll SIM-swap attack: FTX, BlockFi and Genesis clients’ info exposed 28/08/2023 at 14:48 By Helga Labus Financial and risk advisory firm Kroll has suffered a SIM-swapping attack that allowed a threat actor to access files containing personal information of clients of bankrupt cryptocurrency platforms FTX, BlockFi and Genesis. The Kroll SIM-swapping attack On Saturday, August

React to this headline:

Loading spinner

Kroll SIM-swap attack: FTX, BlockFi and Genesis clients’ info exposed Read More »

Open redirect flaws increasingly exploited by phishers

Open redirect flaws increasingly exploited by phishers 23/08/2023 at 12:49 By Helga Labus Phishing attacks using open redirect flaws are on the rise again, according to Kroll’s Cyber Threat Intelligence (CTI) team, which means organizations should consider refreshing employees’ awareness and knowledge on how to spot them. Malicious URL redirection Open redirect vulnerabilities in web

React to this headline:

Loading spinner

Open redirect flaws increasingly exploited by phishers Read More »

Cybercriminals turn to AI to bypass modern email security measures

Cybercriminals turn to AI to bypass modern email security measures 23/08/2023 at 06:31 By Help Net Security Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern email security systems use AI to counter these attacks, according to Perception Point and Osterman Research. AI’s role

React to this headline:

Loading spinner

Cybercriminals turn to AI to bypass modern email security measures Read More »

Zimbra users in Europe, Latin America face phishing threat

Zimbra users in Europe, Latin America face phishing threat 18/08/2023 at 11:04 By Help Net Security ESET researchers have uncovered a mass-spreading phishing campaign aimed at collecting Zimbra account users’ credentials. Zimbra Collaboration is an open-core collaborative software platform, a popular alternative to enterprise email solutions. About the Zimbra phishing campaign The campaign has been

React to this headline:

Loading spinner

Zimbra users in Europe, Latin America face phishing threat Read More »

30% of phishing threats involve newly registered domains

30% of phishing threats involve newly registered domains 18/08/2023 at 05:31 By Help Net Security Phishing remains the most dominant and fastest growing internet crime, largely due to the ubiquity of email and the ceaseless issue of human error that is preyed upon by today’s threat actors, according to Cloudflare. While business email compromise (BEC)

React to this headline:

Loading spinner

30% of phishing threats involve newly registered domains Read More »

Malicious QR Codes Used in Phishing Attack Targeting US Energy Company

Malicious QR Codes Used in Phishing Attack Targeting US Energy Company 17/08/2023 at 19:02 By Ionut Arghire A widespread phishing campaign utilizing malicious QR codes has hit organizations in various industries, including a major energy company in the US. The post Malicious QR Codes Used in Phishing Attack Targeting US Energy Company appeared first on

React to this headline:

Loading spinner

Malicious QR Codes Used in Phishing Attack Targeting US Energy Company Read More »

Phishers use QR codes to target companies in various industries

Phishers use QR codes to target companies in various industries 17/08/2023 at 13:01 By Helga Labus A phishing campaign using QR codes has been detected targeting various industries, with the aim to acquire Microsoft credentials. “The most notable target, a major Energy company based in the US, saw about 29% of the over 1000 emails

React to this headline:

Loading spinner

Phishers use QR codes to target companies in various industries Read More »

Product showcase: Free email security test by ImmuniWeb Community Edition

Product showcase: Free email security test by ImmuniWeb Community Edition 14/08/2023 at 07:03 By Help Net Security According to an FBI report, in 2022, global losses from business email compromise (BEC) and email account compromise (EAC) attacks attained $43 billion, hitting a historic anti-record. Multiple cybersecurity vendors, including Microsoft and Trend Micro, reported a rapid

React to this headline:

Loading spinner

Product showcase: Free email security test by ImmuniWeb Community Edition Read More »

Utilization of Leaked Ransomware Builders in Tech-Related Scams

Utilization of Leaked Ransomware Builders in Tech-Related Scams 09/08/2023 at 22:02 By rohansinhacyblecom Key Takeaways This blog sheds light on a new Tech Scam wherein scammers employ deceptive tactics to lure users into paying for non-existent antivirus solutions. Uncovering Tech Scammers possible involvement in different ransomware attacks. The IP address of a domain used in

React to this headline:

Loading spinner

Utilization of Leaked Ransomware Builders in Tech-Related Scams Read More »

Sophisticated SiMay RAT Spreads Via Telegram Phishing Site

Sophisticated SiMay RAT Spreads Via Telegram Phishing Site 09/08/2023 at 22:02 By rohansinhacyblecom   Keylogger and Gh0st RAT Variant deployed to spy on Users   Threat actors (TAs) have been relentlessly employing diverse techniques to propagate malware by leveraging counterfeit websites of renowned applications. Cyble Research and Intelligence Labs (CRIL) reported on a trojanized version

React to this headline:

Loading spinner

Sophisticated SiMay RAT Spreads Via Telegram Phishing Site Read More »

Russian APT phished government employees via Microsoft Teams

Russian APT phished government employees via Microsoft Teams 03/08/2023 at 15:17 By Zeljka Zorz An APT group linked to Russia’s Foreign Intelligence Service has hit employees of several dozen global organizations with phishing attacks via Microsoft Teams, says Microsoft. A social engineering attack to bypass MFA protection “To facilitate their attack, the actor uses Microsoft

React to this headline:

Loading spinner

Russian APT phished government employees via Microsoft Teams Read More »

Salesforce Email Service Zero-Day Exploited in Phishing Campaign

Salesforce Email Service Zero-Day Exploited in Phishing Campaign 03/08/2023 at 12:47 By Eduard Kovacs Threat actors have exploited a Salesforce email service zero-day vulnerability and abused Meta features in a sophisticated phishing campaign. The post Salesforce Email Service Zero-Day Exploited in Phishing Campaign appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Salesforce Email Service Zero-Day Exploited in Phishing Campaign Read More »

Shield and Visibility Solutions Target Phishing From Inside the Browser

Shield and Visibility Solutions Target Phishing From Inside the Browser 02/08/2023 at 21:18 By Kevin Townsend Menlo Security introduced anti-phishing solutions that analyze what users see on a landing page rather than just analyzing the content of an email. The post Shield and Visibility Solutions Target Phishing From Inside the Browser appeared first on SecurityWeek.

React to this headline:

Loading spinner

Shield and Visibility Solutions Target Phishing From Inside the Browser Read More »

Salesforce and Meta suffer phishing campaign that evades typical detection methods

Salesforce and Meta suffer phishing campaign that evades typical detection methods 02/08/2023 at 17:18 By Help Net Security The Guardio research team discovered an email phishing campaign exploiting a zero-day vulnerability in Salesforce’s legitimate email services and SMTP servers. Phishing email sample as was sent from the “@salesforce.com” email address The vulnerability allowed threat actors

React to this headline:

Loading spinner

Salesforce and Meta suffer phishing campaign that evades typical detection methods Read More »

Google AMP Abused in Phishing Attacks Aimed at Enterprise Users

Google AMP Abused in Phishing Attacks Aimed at Enterprise Users 02/08/2023 at 15:42 By Ionut Arghire Threat actors are using Google AMP URLs in phishing campaigns as a new detection evasion tactic. The post Google AMP Abused in Phishing Attacks Aimed at Enterprise Users appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Google AMP Abused in Phishing Attacks Aimed at Enterprise Users Read More »

1 in 100 emails is malicious

1 in 100 emails is malicious 02/08/2023 at 06:04 By Help Net Security BEC and phishing attacks soar by 20% and 41% respectively in H1 2023, according to Perception Point. Cyber attackers have continued to refine their methods, adopting more sophisticated techniques to exploit vulnerabilities across various sectors. With the ever-increasing reliance on workplace technologies,

React to this headline:

Loading spinner

1 in 100 emails is malicious Read More »

The gap in users’ identity security knowledge gives cybercriminals an opening

The gap in users’ identity security knowledge gives cybercriminals an opening 01/08/2023 at 06:34 By Help Net Security With exponential growth in the number of human and machine actors on the network and more sophisticated technology in more places, identity in this new era is rapidly becoming a super-human problem, according to RSA. Paradoxically, even

React to this headline:

Loading spinner

The gap in users’ identity security knowledge gives cybercriminals an opening Read More »

Zero trust rated as highly effective by businesses worldwide

Zero trust rated as highly effective by businesses worldwide 26/07/2023 at 06:33 By Help Net Security Zero trust is here to stay, with 82% of experts currently working on implementing zero trust, and 16% planning to begin within 18 months, according to Beyond Identity. Over 90% of those working on zero trust cited that the

React to this headline:

Loading spinner

Zero trust rated as highly effective by businesses worldwide Read More »

Scroll to Top