Researchers discovered a new phishing kit on the dark web

Researchers discovered a new phishing kit on the dark web

Researchers at SlashNext discovered a new phishing kit on the dark web. This phishing kit, known as FishXProxy Phishing Kit, starts with uniquely generated links that can evade initial suspicion. Cybercriminals on underground forums are advertising this kit as “The Ultimate Powerful Phishing Toolkit” due to the sophisticated tools it provides. Capabilities this phishing kit provides includes: Sophisticated antibot systems that utilize Cloudfare’s CAPTCHA and filter out security measures Redirection abilities that obscure intended destinations Page…

Read More

Cybersecurity at the Paris Summer Olympics

Cybersecurity at the Paris Summer Olympics

In this episode of The Security Podcasts featuring Mark Manglicmot, SVP of Security Services at Arctic Wolf, we discuss how individuals and businesses can defend against cyber threats during the Olympics.  “For this year’s Olympics specifically, the risks of AI being manipulated by bad actors is increasingly high and a new threat for this Olympics compared to the past with the emergence of the technology. This is why individuals, athletes, administrators, coaches and anybody else attending…

Read More

Ransomware Cheat Sheet for 2024: What Is Ransomware?

Ransomware Cheat Sheet for 2024: What Is Ransomware?

Ransomware is arguably the most high-profile security threat of the moment. Cybercriminals across the world are demanding money from victims by holding their devices and data hostage. This type of attack, in which data is encrypted or claimed to be and victims are prompted to pay for the key to restore access, has been growing rapidly since 2013 and is now one of the most common types of malware. TechRepublic’s cheat sheet about ransomware is…

Read More

Email obfuscation tactics elude security protections

Email obfuscation tactics elude security protections

Cyber attackers have used email obfuscation techniques for decades to conceal malicious code or data within a file, script or network traffic. There are many email obfuscation methods, such as putting addresses into images, captchas or texts that bots cannot read. Such traditional email obfuscation tactics are well known, and security controls have historically been good at patching and stopping them. But recently our threat researchers have uncovered some newly evolving techniques that are designed…

Read More

How to Spot a Business Email Compromise Scam

How to Spot a Business Email Compromise Scam

So this is the first step: Take control of your emotions. Yes, it can be difficult if you work in a demanding field. But it’s your best first defense, and your employer will thank you for it (or, at least, they should). Always Confirm Through a Second Channel Now that you’re skeptically questioning the legitimacy of the urgent request, check to make sure the email is coming from the person it claims to be from….

Read More

How to Avoid Being Phished by Your Phone | McAfee Blog

How to Avoid Being Phished by Your Phone | McAfee Blog

By now you’ve probably heard of the term “phishing”—when scammers try to fool you into revealing your personal info or sending money, usually via email — but what about “vishing”? Vishing, or voice phishing, is basically the same practice, but done by phone. There are a few reasons why it’s important for you to know about vishing. First off, voice phishing scams are prevalent and growing. A common example around tax season is the IRS scam,…

Read More

Untrained users are the greatest weakness in a cyber defense plan

Untrained users are the greatest weakness in a cyber defense plan

KnowBe4 has released its 2024 Phishing by Industry Benchmarking Report. This report measures the likelihood that an organization’s employees would fall for a phishing or social engineering scam, assessing the status of security preparedness and awareness across global industries such as government, healthcare and critical infrastructure.  54 million simulated phishing tests were analyzed in the report. These tests involved more than 11.9 million individuals from 55,675 organizations across 19 industries. Through this analysis, the report found…

Read More

Navigating political polarization in the workplace

Navigating political polarization in the workplace

In this episode of The Security Podcasts featuring Scott McHugh, retired CSO at LyondellBasell Chemical Company and Faculty at Rice University, we discuss the challenges security leaders face when navigating political polarization in the workplace. “This is actually not a new phenomenon,” Scott McHugh says. “It really started in the late ’90s, in the Clinton administration, and it’s just been manifesting itself through the years ever since then. And it’s become much more of a…

Read More

Downtime Costs Large Companies $400 Billion a Year, According to Splunk Report

Downtime Costs Large Companies 0 Billion a Year, According to Splunk Report

Unplanned downtime is costing the world’s largest companies $400 billion a year, or roughly 9% of their profits, a new report has found. This is the equivalent of about $9,000 lost for every minute of system failure or service degradation. The report, published by the data management platform Splunk, also revealed that it takes 75 days for revenue for a Forbes Global 2000 company to recover to where it stood financially prior to the incident….

Read More

Cisco Talos: LilacSquid Threat Actor Targets Multiple Sectors Worldwide With PurpleInk Malware

Cisco Talos: LilacSquid Threat Actor Targets Multiple Sectors Worldwide With PurpleInk Malware

A new report from Cisco Talos exposed the activities of a threat actor known as LilacSquid, or UAT-4820. The threat actor exploits vulnerable web applications or uses compromised Remote Desktop Protection credentials to successfully compromise systems by infecting them with custom PurpleInk malware. So far, organizations in various sectors in the U.S., Europe and Asia have been impacted for data theft purposes, though more sectors might have been impacted but not identified yet. Who is…

Read More
1 2 3 4 15