Most Enterprises Fail to Implement Proper Protection Against Phishing Attacks

Most Enterprises Fail to Implement Proper Protection Against Phishing Attacks

Nearly all businesses are attacked 50+ times per month

Holiday Suppliers Already Under Assault by Fileless Malware Campaign

Holiday Suppliers Already Under Assault by Fileless Malware Campaign

Attackers use the NetwiredRC backdoor to compromise victims

Almost 300 Percent Increase in eCommerce Phishing Attacks in Q3 2018

Almost 300 Percent Increase in eCommerce Phishing Attacks in Q3 2018

Retail website phishing clones used as main phishing tools

Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks

Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks

Backdoor uses anti-forensics techniques to hinder analysis

FBI Releases Document with Measures for Defending Against Payroll Phishing Scams

FBI Releases Document with Measures for Defending Against Payroll Phishing Scams

Scammers replace direct deposit information to steal funds

More Than $600K Lost by Henderson ISD After BEC Attack

More Than $600K Lost by Henderson ISD After BEC Attack

Crooks stole $609,615 from the Independent School District

Cryptojacking Is the Top Cybersecurity Threat For the First Half of 2018

Cryptojacking Is the Top Cybersecurity Threat For the First Half of 2018

Dethrones ransomware from top dog position

Cyber Fraud Ring Used Phishing to Steal $4 Million, Alleged Leader Faces Charges

Cyber Fraud Ring Used Phishing to Steal $4 Million, Alleged Leader Faces Charges

The Romanian national was charged in a four-count indictment

URSNIF Phishing Campaign Spreads Malware by Replying to Existing E-mail Threads

URSNIF Phishing Campaign Spreads Malware by Replying to Existing E-mail Threads

Malware uses Tor to exfiltrate data to its C&C server

$12 Billion Lost Because of E-mail Account Compromise Incidents in Five Years

$12 Billion Lost Because of E-mail Account Compromise Incidents in Five Years

Bad actors offer mail hacking services for as little as $150

Picture-in-Picture Phishing Campaign Goes After Steam Credentials

Picture-in-Picture Phishing Campaign Goes After Steam Credentials

Scammers used a picture-in-picture phishing pop-up

Roaming Mantis Group Adds Phishing and Web Crypto Mining for iOS Devices

Roaming Mantis Group Adds Phishing and Web Crypto Mining for iOS Devices

The threat group has increased the number of targets

  • Security
  • By Sergiu Gatlan
  • September 28th, 2018
New Phishing Campaign Targets US Employees' Online Payrolls

New Phishing Campaign Targets US Employees' Online Payrolls

Crooks use stolen info to change bank account information

  • Security
  • By Sergiu Gatlan
  • September 25th, 2018
SMS Phishing Campaign Attacks Unaware Job Hunters

SMS Phishing Campaign Attacks Unaware Job Hunters

Text messages can be used as an effective phishing tool too

  • Security
  • By Sergiu Gatlan
  • September 19th, 2018
Fake Finance Apps Phish Credit Card Data from Android Users

Fake Finance Apps Phish Credit Card Data from Android Users

The crooks were also collecting login credentials

  • Security
  • By Sergiu Gatlan
  • September 12th, 2018
Veeam Leaked Over 445 Million Records via Exposed Database

Veeam Leaked Over 445 Million Records via Exposed Database

Database contained names, e-mails, and organization size

  • Security
  • By Sergiu Gatlan
  • September 11th, 2018
Safari Vulnerable to Address Bar Spoofing on iOS

Safari Vulnerable to Address Bar Spoofing on iOS

Microsoft's Edge was also exposed but got patched

 
Want more? Browse: