Facebook Messenger Scam Duped Millions
One well crafted phishing message sent via Facebook Messenger ensnared 10 million Facebook users and counting. [...]
One well crafted phishing message sent via Facebook Messenger ensnared 10 million Facebook users and counting. [...]
In response to a comment about the Prophet Mohammed, a hacktivist group in Malaysia has unleashed a wave of cyber attacks in India. [...]
Upsurge in the tourism industry after the COVID-19 pandemic grabs the attention of cybercriminals to scam the tourists. [...]
The dangers to SMBs and businesses of all sizes from cyberattacks are well known. But what’s driving these attacks, and what do cybersecurity stakeholders need to do that they’re not already doing? [...]
Attackers gained access to private account details through an email compromise incident that occurred in April. [...]
Symbiote, discovered in November, parasitically infects running processes so it can steal credentials, gain rootlkit functionality and install a backdoor for remote access. [...]
Researchers demonstrated a possible way to track individuals via Bluetooth signals. [...]
Environmentalists and policymakers warn water treatment plants are ripe for attack. [...]
The dangerous malware appears to be well and truly back in action, sporting new variants and security-dodging behaviors in a wave of recent phishing campaigns. [...]
Sabre and Travelport had to report the weekly activities of former “Cardplanet” cybercriminal Aleksei Burkov for two years, info that eventually led to his arrest and prosecution. [...]
Rob Gurzeev, CEO and Co-Founder of CyCognito, explores external attack surface soft spots tied to an ever-expanding number of digital assets companies too often struggle to keep track of and manage effectively. [...]
Ransomware attackers often strike targets twice, regardless of whether the ransom was paid. [...]
The novel cybercriminal group tapped the ever-evolving info-stealing trojan to move laterally on a network in a recent attack, researchers have found. [...]
The costs associated with a cyberattack can be significant, especially if a company does not have an Incident Response plan that addresses risk. [...]
Insider Risk Management requires a different approach than to those from external threats. IRM is unique from other domains of security in that the data sources which serve as inputs are as often people as they are tools. Shifting the analyst‘s mindset when handling risks presented by insiders …
A government-aligned attacker tried using a Microsoft vulnerability to attack U.S. and E.U. government targets. [...]
The vulnerability remains unpatched on many versions of the collaboration tool and has potential to create a SolarWinds-type scenario. [...]
Deja-Vu data from this year's DBIR report feels like we are stuck in the movie 'Groundhog Day.' [...]
The cybercriminal group is distancing itself from its previous branding by shifting tactics and tools once again in an aim to continue to profit from its nefarious activity. [...]
Melissa Bischoping, security researcher with Tanium and Infosec Insiders columnist, urges firms to consider the upstream and downstream impact of "triple extortion" ransomware attacks. [...]
Hackers escalate phishing and scamming attacks to exploit popular Discord bot and persuade users to click on the malicious links. [...]
The info-stealing trojan used SMS messages and lifted contact credentials to spread with unprecedented speed across Android devices globally since December 2020. [...]
There is no question that the level of threats facing today’s businesses continues to change on a daily basis. So what are the trends that CISOs need to be on the lookout for? For this episode of the Threatpost podcast, I am joined by Derek Manky, Chief Security …
There is no question that the level of threats facing today’s businesses continues to change on a daily basis. So what are the trends that CISOs need to be on the lookout for? For this episode of the Threatpost podcast, I am joined by Derek Manky, Chief Security …
Threat actors already are exploiting vulnerability, dubbed ‘Follina’ and originally identified back in April, to target organizations in Russia and Tibet, researchers said. [...]