The 2019 IBM X-Force Threat Intelligence Index shows that cybercriminals are moving away from ransomware and malware in general because a growing awareness of these attacks among organizations, in …
Attackers Continue to Focus on Users, Well-Worn Techniques
Two new research reports indicate that threat actors mostly rely on traditional techniques, including phishing and credential stuffing, to target organizations. Trend Micro's yearly security report …
Continue Reading about Attackers Continue to Focus on Users, Well-Worn Techniques
Hackers Use Compromised Banks as Starting Points for Phishing Attacks
A new report by Group-IB indicates that cyber attacks on financial institutions can create a domino-effect when threat actors use their foothold on a breached network to infiltrate the systems of …
Continue Reading about Hackers Use Compromised Banks as Starting Points for Phishing Attacks
Clever Phishing Attack Enlists Google Translate to Spoof Login Page
Akamai researchers have uncovered a new and unique phishing campaign. As in all phishing campaigns, the threat actors are out to obtain sensitive information from victims. In this case, they want to …
Continue Reading about Clever Phishing Attack Enlists Google Translate to Spoof Login Page
Microsoft remains the most impersonated brand, Netflix phishing spikes
According to Vade Secure's latest phishing report, the most impersonated brand in the final quarter of last year was Microsoft (again). The other brands making up the top 10 were Netflix, Paypal, Bank …
Continue Reading about Microsoft remains the most impersonated brand, Netflix phishing spikes
Fortnite vulnerabilities would have allowed attackers to intercept and steal login credentials
Research by Check Point has uncovered serious vulnerabilities in the user login process of Fortnite, the immensely popular online battle royale game. The flaws, which have recently been patched, could …
New tool automates phishing attacks that bypass 2FA
At the start of this year, Polish researcher Piotr Duszyński published Modlishka, a new penetration testing tool that makes the automation of phishing attacks easier than ever before, and even allows …
Continue Reading about New tool automates phishing attacks that bypass 2FA