Search results: spearphishing

chatgpt-spear-phishing

ChatGPT Spearphishing: Social Engineering at Scale

| | Blog, Use Cases
Modern-day SDRs (sales development reps) perform acts of phishing for a living. Today’s business culture, especially in technology sales, accepts this as how business gets done. They do lead generation to identify ...
Multi-Year Spearphishing Campaign Targets the Maritime Industry Likely for Financial Gain 

Multi-Year Spearphishing Campaign Targets the Maritime Industry Likely for Financial Gain 

Executive summary In May 2020 EclecticIQ Intelligence and Research Team published a report () on phishing lures impersonating the maritime industry. This research offers new insights and update on the topic. The ...
Oil & Gas Spearphishing Campaigns Drop Agent Tesla Spyware in Advance of Historic OPEC+ Deal

Oil & Gas Spearphishing Campaigns Drop Agent Tesla Spyware in Advance of Historic OPEC+ Deal

Bitdefender researchers have recently found spearphishing campaigns, either impersonating a well-known Egyptian engineering contractor or a shipment company, dropping the Agent Tesla spyware Trojan. The impersonated engineering contractor (Enppi – Engineering for ...

How a National Healthcare Provider Mitigates Spearphishing With SecurityIQ’s PhishNotify

Executive Summary: Client: Managed healthcare service provider with clients in over 30 states, 200 corporate employees and 700 clinical staff Deployment Size: 900 learner seats Capabilities Used:... Go on to the site ...
Akira ransomware

Akira Ransomware Group Takes in $42 Million From 250 Attacks in a Year

| | Akira, cisa, Linux, Ransomware
CISA and the FBI profile a highly adaptable and constantly evolving threat gang that targets both Windows and Linux systems ...
Security Boulevard

Microsoft’s April 2024 Patch Tuesday: Updates for 150 Vulnerabilities and Two Zero-Days

| | Blog
In a significant security update, Microsoft has released its April 2024 Patch Tuesday updates, which address a hefty 150 vulnerabilities across its suite of products. This update is particularly noteworthy not only ...
™

D3 Security Releases “In the Wild 2024” Report with Analysis and Incident Response Playbooks for the 10 Most Prevalent Cyber Attack Techniques

Vancouver, BC — April 10, 2024 — D3 Security, the leader in smart security orchestration, automation, and response (SOAR), today published In the Wild 2024, the first in a series of reports ...
healthcare voice scams

HHS: Health Care IT Helpdesks Under Attack in Voice Scams

Scammers are impersonating employees in voice calls to gain access to healthcare organizations' systems and steal money, the agency says ...
Security Boulevard
API security ransomware extortion shift

Why API Security is Crucial in Defending Against Ransomware Attacks

APIs often play a key role in a ransomware attack, making their security an important part of a ransomware defense strategy ...
Security Boulevard
Attackers leverage PyPI to sideload malicious DLLs

Attackers leverage PyPI to sideload malicious DLLs

| | Threat Research
ReversingLabs researchers have observed a clear trend in which open-source platforms and code have become the stage for a growing and diverse range of malicious activity and campaigns. This trend includes hosting ...