Skip to content
Latest News
  • Java at 30: How a language designed for a failed gadget became a global powerhouse
  • I've tested dozens of work laptops - but I'd take this Lenovo to the office everyday
  • Avery Dennison takes culture-first approach to AI transformation
  • 6 ways I save money on TV streaming without losing the shows I love
  • It almost pains me to say it, but Microsoft Edge is great on Linux - you should try it
Unified Networking
  • Home
  • My Blogs
    • CASE STUDIES
    • DE
    • CONF TEMPLATES
  • Friendly Blogs
    • Networking Updates
    • Virtulization Updates
    • Security Updates
  • VIDEOS
    • Cisco dcloud Labs
  • News
  • My Profile

Meta is the second most spoofed brand for credential phishing

Posted on May 15, 2024May 15, 2024 by Admin
Meta is the second most spoofed brand for credential phishing

Related Post

  • Avery Dennison takes culture-first approach to AI transformation
  • UK MoD Launches New Cyber Warfare Command
  • “AI 비서가 팀 단위로 지원하는 효과”···퍼플렉시티, AI 프로젝트 10분 완성 도구 ‘랩스’ 출시
  • Interlock ransomware: what you need to know
  • Better Together: How MFA and Strong Password Practices Can Help Bolster Security

A report by Cofense examines the inner workings of a sophisticated phishing campaign, one that can bypass multi-factor authentication (MFA) in order to target Meta business accounts. The report reveals the existence of a cybercrime toolkit allowing malicious actors to create links, emails and other deployable tools. Currently, this campaign can create phishing emails in various languages and directed at 19 countries. 

These emails appear to originate from Meta, claiming that the targeted account infringed upon copyright or violated another rule. If the campaign succeeds, then the followers of the targeted business account may be at risk of targeted attacks such as malicious ads. 

Key findings from the report include: 

  • Based on credential phishing emails in 2024, Meta is the second most spoofed brand. The most spoofed brand is Microsoft. 
  • A notable amount of these phishing emails in enterprise environments are protected by secure email gateways (SEGs). 
  • The infrastructure involved in the campaign includes an ability create Netlify App links, a tool that checks if links are live, an indicators of compromise list and data on targets/financial profits. 



Source link

Posted in RSS_Virtulization Tagged business security, email spoofing, phishing campaigns, social media, social media account hack

Post navigation

Achieving CIOs’ top investment priorities requires filling the tech skills gap
Empowering Developers at Microsoft Build: Docker Unveils Integrations and Sessions | Docker

Subscribe For Updates

VMWARE

Helping Public Sector Organisations Define Cloud Strategy
October 29, 2020

Helping Public Sector Organisations Define Cloud Strategy

Introduction Cloud computing services have grown exponentially in

May 18, 2016

How to change the VLAN ID of the Service Console in ESX from the command line/console

June 09, 2015

Cisco UCS and Vmware Interfaces (Vnics) HA Design Considerations

June 07, 2015

Troubleshooting network and TCP/UDP port connectivity issues on ESX/ESXi(2020669)

May 12, 2015

vSphere Client Parameters

View All

Configuration Templates

February 16, 2015

CUE Licenses

Note: Useful LINK COPIED FROM OTHER SOURCE FOR REFERENCE INTRODUCTION

February 02, 2015

Trouble shooting Unity Express with Call Manager Integeration & Operational Issues

November 08, 2014

CME Configuration Example: SIP Trunks to Viatalk and VoIP.ms

November 08, 2014

SIP Phone registration – CME Configuration

November 08, 2014

CUE Voicemail + VPIM networking (CUE to unity)

View All

Copyright 2016. All rights reserved

Proudly powered by WordPress | Profitmag by Rigorous Themes
Love This Article? Spread It.
X
  • Tweet