ChatGPT Spearphishing: Social Engineering at Scale
Modern-day SDRs (sales development reps) perform acts of phishing for a living. Today’s business culture, especially in technology sales, accepts this as how business gets done. They do lead generation to identify ...
Multi-Year Spearphishing Campaign Targets the Maritime Industry Likely for Financial Gain
Executive summary In May 2020 EclecticIQ Intelligence and Research Team published a report () on phishing lures impersonating the maritime industry. This research offers new insights and update on the topic. The ...
Oil & Gas Spearphishing Campaigns Drop Agent Tesla Spyware in Advance of Historic OPEC+ Deal
Bitdefender researchers have recently found spearphishing campaigns, either impersonating a well-known Egyptian engineering contractor or a shipment company, dropping the Agent Tesla spyware Trojan. The impersonated engineering contractor (Enppi – Engineering for ...
How a National Healthcare Provider Mitigates Spearphishing With SecurityIQ’s PhishNotify
Executive Summary: Client: Managed healthcare service provider with clients in over 30 states, 200 corporate employees and 700 clinical staff Deployment Size: 900 learner seats Capabilities Used:... Go on to the site ...
Akira Ransomware Group Takes in $42 Million From 250 Attacks in a Year
CISA and the FBI profile a highly adaptable and constantly evolving threat gang that targets both Windows and Linux systems ...
Microsoft’s April 2024 Patch Tuesday: Updates for 150 Vulnerabilities and Two Zero-Days
In a significant security update, Microsoft has released its April 2024 Patch Tuesday updates, which address a hefty 150 vulnerabilities across its suite of products. This update is particularly noteworthy not only ...
D3 Security Releases “In the Wild 2024” Report with Analysis and Incident Response Playbooks for the 10 Most Prevalent Cyber Attack Techniques
Vancouver, BC — April 10, 2024 — D3 Security, the leader in smart security orchestration, automation, and response (SOAR), today published In the Wild 2024, the first in a series of reports ...
HHS: Health Care IT Helpdesks Under Attack in Voice Scams
Scammers are impersonating employees in voice calls to gain access to healthcare organizations' systems and steal money, the agency says ...
Why API Security is Crucial in Defending Against Ransomware Attacks
APIs often play a key role in a ransomware attack, making their security an important part of a ransomware defense strategy ...
Attackers leverage PyPI to sideload malicious DLLs
ReversingLabs researchers have observed a clear trend in which open-source platforms and code have become the stage for a growing and diverse range of malicious activity and campaigns. This trend includes hosting ...