Summer Olympics: What IT Teams Need to Do Before & During the Event for Their Businesses

Summer Olympics: What IT Teams Need to Do Before & During the Event for Their Businesses

Cyberattacks targeting the Paris Olympics have made headlines lately. Travel safety is important, but so is keeping up with online hygiene for those employees who may be working from home or in the office. The Olympics happen over multiple weeks and during work hours, unlike many other major sporting events, so there are more opportunities for threat actors to exploit the excitement. We’ve gathered some tips for IT teams during the Summer Olympics, with ideas…

Read More

Google Steps Up The Battle Against Gmail Spam

Google Steps Up The Battle Against Gmail Spam

Starting in early 2024, Google tightened three enforcement efforts in the organization’s on-going fight against spam. First, bulk senders of email must authenticate email with domain-related email settings to ensure each email is actually from the sender specified. Second, large senders of email must offer a one-click unsubscribe option and process the request within two days, so people don’t experience absurdly long delays or complicated opt-out processes when they unsubscribe. Third, Google will enforce a…

Read More

Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More

Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More

The Federal Bureau of Investigation and Cybersecurity & Infrastructure Security Agency warned in a joint advisory about a threat actor deploying a botnet that makes use of the Androxgh0st malware. This malware is capable of collecting cloud credentials, such as those from AWS or Microsoft Azure and more, abusing the Simple Mail Transfer Protocol, and scanning for Amazon Simple Email Service parameters. What is the Androxgh0st malware? The Androxgh0st malware was exposed in December 2022…

Read More

Explorations in the spam folder: A sum greater than the parts

Explorations in the spam folder: A sum greater than the parts

Phishing is a problem that affects everyone, from the untrained to the highly skilled. It’s a problem that happens everywhere, from the office to the home. It comes through email, text, phone calls, etc. The location or means of delivery doesn’t matter—these criminals are going to target you where you are. If the location is one that you’re less likely to suspect, that’s all the better for them. The longer they can mask the scam—revealing…

Read More

The Good, Bad & Ugly About ChatGPT

The Good, Bad & Ugly About ChatGPT

The Good, Bad & Ugly About ChatGPT | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

New APT34 Malware Targets The Middle East

New APT34 Malware Targets The Middle East

APT34 Targeting and Arsenal Evolution APT34 has been documented to target organizations worldwide, particularly companies from the financial, government, energy, chemical, and telecommunications industries in the Middle East since at least 2014. Documented as a group primarily involved for cyberespionage, APT34 has been previously recorded targeting government offices and show no signs of stopping with their intrusions. Our continuous monitoring of the group proves it continues to create new and updated tools to minimize the detection…

Read More

No, You Haven’t Won a Yeti Cooler From Dick’s Sporting Goods

No, You Haven’t Won a Yeti Cooler From Dick’s Sporting Goods

Congratulations: You’ve been chosen for a Yeti Hopper M20 Cooler. You’ve been chosen many, many times. It’s right there, in your inbox.  The email is from Dick’s Sporting Goods. Never mind that it reads as Dicks Sporting Goods, minus the apostrophe, or Dicks SportingGoods, or Dicks SPORTING Goods. Search for “Dicks” in your Gmail and you’ll find it. Search for “Dicks” on Twitter and—well, something else might come up. But then you’ll see them, the complaints from people…

Read More

Twitter lacks cybersecurity & data privacy best practices, says ex-security chief

Twitter lacks cybersecurity & data privacy best practices, says ex-security chief

Twitter lacks cybersecurity & data privacy best practices, says ex-security chief | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Bruised but Not Broken: The Resurgence of the Emotet Botnet Malware

Bruised but Not Broken: The Resurgence of the Emotet Botnet Malware

The Emotet botnet malware is well known in the cybersecurity industry for its success in using spam emails to compromise machines and then selling access to these machines as part of its infamous malware-as-a-service (MaaS) scheme. Operators behind notorious threats such as the Trickbot trojan and the Ryuk or Conti ransomware are among the malicious actors who have used the botnet malware in their attacks. But in January 2021 came news of Emotet’s dismantling, dubbed…

Read More

Emotet Spam Abuses Unconventional IP Address Formats to Spread Malware

Emotet Spam Abuses Unconventional IP Address Formats to Spread Malware

Emotet Spam Abuses Unconventional IP Address Formats to Spread Malware We found waves of Emotet spam campaigns using unconventional IP addresses to evade detection. By: Ian Kenefick January 21, 2022 Read time:  ( words) We observed Emotet spam campaigns using hexadecimal and octal representations of IP addresses, likely to evade detection via pattern matching. Both routines use social engineering techniques to trick users into enabling document macros and automate malware execution. Upon receiving these standards,…

Read More
1 2