Massive adversary-in-the-middle phishing campaign bypasses MFA and mimics Microsoft Office

Microsoft has already seen millions of phishing emails sent every day by attackers using this phishing kit. Learn how to protect your business from this AitM campaign. The post Massive adversary-in-the-middle phishing campaign bypasses MFA and mimics M...

By |2023-03-23T19:18:54+00:00March 23, 2023|cybersecurity, mfa, Microsoft, multifactor authentication, phishing, Security, Uncategorized|Comments Off on Massive adversary-in-the-middle phishing campaign bypasses MFA and mimics Microsoft Office

BECs double in 2022, overtaking ransomware

A look at 4th quarter 2022, data suggests that new threat surfaces notwithstanding, low-code cybersecurity business email compromises including phishing, as well as MFA bombing are still the prevalent exploits favored by threat actors. The post BECs do...

By |2023-03-20T18:43:58+00:00March 20, 2023|business email compromise, Cloud, cloud security, cybersecurity, phishing, ransomware, Security, Uncategorized|Comments Off on BECs double in 2022, overtaking ransomware

Humans are still better at creating phishing emails than AI — for now

AI-generated phishing emails, including ones created by ChatGPT, present a potential new threat for security professionals, says Hoxhunt. The post Humans are still better at creating phishing emails than AI — for now appeared first on TechRepublic.

By |2023-03-15T20:57:25+00:00March 15, 2023|Artificial Intelligence, chatgpt, CXO, cybersecurity, Innovation, phishing, Security, Uncategorized|Comments Off on Humans are still better at creating phishing emails than AI — for now

For credentials, these are the new Seven Commandments for zero trust

With backing from major firms, credential security company Beyond Identity has launched the Zero Trust Authentication initiative for organizations to hack-proof user credentials. The post For credentials, these are the new Seven Commandments for zero t...

By |2023-03-15T16:48:28+00:00March 15, 2023|credentials, email, malware, phishing, ransomware, Security, Uncategorized, zero trust|Comments Off on For credentials, these are the new Seven Commandments for zero trust

Cryptocurrency users in the US hit by ransomware and Clipper malware

Learn how to protect your business and staff from the MortalKombat ransomware and Laplas Clipper malware. The post Cryptocurrency users in the US hit by ransomware and Clipper malware appeared first on TechRepublic.

By |2023-02-16T18:07:49+00:00February 16, 2023|cryptocurrency, cybersecurity, malware, phishing, ransomware, Security, Uncategorized|Comments Off on Cryptocurrency users in the US hit by ransomware and Clipper malware

Investigators uncover crypto scammers baiting ‘phish’ hooks on YouTube

A report reveals a new network of malefactors in the lucrative crypto fraud market using videos, channels and web apps. The post Investigators uncover crypto scammers baiting ‘phish’ hooks on YouTube appeared first on TechRepublic.

By |2023-02-15T18:53:46+00:00February 15, 2023|bitcoin, blockchain, crypto scammers, cryptocurrency, ether, phishing, Security, tether, Uncategorized, youtube|Comments Off on Investigators uncover crypto scammers baiting ‘phish’ hooks on YouTube

C-suite execs expect cyberattacks targeting financial data to increase this year

The trend will carry from the past 12 months when more than a third of executives polled by Deloitte said that cyberattacks targeted their financial and accounting data. The post C-suite execs expect cyberattacks targeting financial data to increase th...

By |2023-02-09T17:26:00+00:00February 9, 2023|cyber, cybersecurity, data theft, deloitte, finance data, malware, phishing, ransomware, Security, Uncategorized|Comments Off on C-suite execs expect cyberattacks targeting financial data to increase this year

New cybersecurity data reveals persistent social engineering vulnerabilities

Ransomware was down last year, though LockBit led threat actors and employees opened a third of the toxic emails in the last six months of 2022. The post New cybersecurity data reveals persistent social engineering vulnerabilities appeared first on Te...

By |2023-02-08T11:00:19+00:00February 8, 2023|abnormal security, email, lockbit, ncc group, phishing, ransomware, Security, threat actor, Uncategorized|Comments Off on New cybersecurity data reveals persistent social engineering vulnerabilities

Prilex POS malware evolves to block contactless transactions

A new version of the Prilex POS malware has found a novel way to steal your credit card information. The post Prilex POS malware evolves to block contactless transactions appeared first on TechRepublic.

By |2023-02-02T15:35:41+00:00February 2, 2023|contactless, credit card, insert card, malware, phishing, pin, pin pad, point of service, pos, prilex, Security, transaction, Uncategorized|Comments Off on Prilex POS malware evolves to block contactless transactions

OneNote documents spread malware in several countries

A new phishing campaign abuses OneNote documents to infect computers with the infamous AsyncRAT malware, targeting users in the U.K., Canada and the U.S. The post OneNote documents spread malware in several countries appeared first on TechRepublic.

By |2023-02-01T20:03:54+00:00February 1, 2023|asyncrat, Developer, malware, onenote, phishing, ransomware, Security, Uncategorized|Comments Off on OneNote documents spread malware in several countries
Go to Top