2.2 C
Paris
Sunday, January 29, 2023

Phishing

Understand And Reduce Your Attack Surface

The attack surface of your organization can be defined as all the possible entry points an attacker may try to exploit to gain access...

APT Group Targeting Governments Worldwide

According to cyber security researchers from Trend Micro, state-financed Chinese hackers have launched a spear phishing campaign to launch bespoke malware stored within Google...

What is a Vishing Attack?

Social engineering attacks use the “human loophole” to get around security controls. Instead of hacking your accounts to steal your identity, they hack you....

Your Company’s Strongest Assets Are Its Weakest Links

The Numbers Don't Lie According to IBM Security’s Cost of a Data Breach Report 2022 calculations, the top five countries and regions for the highest...

ThePhish: An Open Source Phishing Email Analysis Tool

A new open source phishing email analysis tool has been published on Githhub, which helps automate the analysis process. ThePhish, was created by Emanuele Galdi,...

Email Which Claims to Come from Saudi Aramco Delivers Malware

MalwareBytes research team found a targeted email campaign carrying two attachments, a pdf file and an excel file. The email pretends to come from Saudi...

Hackers Use PowerPoint Files to Deliver Malicious Files

A little-known PowerPoint add-on, the .ppam file, has been used by hackers to hide and deliver malicious files. Security researchers from Avanan, observed that .ppam...

Actor’s Twitter Account Hacked and Used to Spam on NFT Giveaways

On Thursday a verified twitter profile of Siobhan McSweeney, a well known Irish actor, was hacked and was used to spam on NFT giveaways....

North Korean APT Spreading Malware Through Spear Phishing Attacks

The "Lazarous Group", a North Korean APT conducted a spear phishing attack, weaponized with malicious documents that try to lure targets into clicking by...

Hackers Demand Ransom for Hijacked Instagram Accounts

Secureworks has identified a phishing campaign that hijacks corporate Instagram accounts, as well as accounts of individual influencers who have a large number of...

Latest