Why Phishing Works: Human Gullibility

Attackers Host Phishing Pages on Azure

Researchers have recently seen phishing attacks against Office 365 users wherein fake log-in pages were hosted on Microsoft Azure to give them more credibility. According to researchers from security firm EdgeWave, the ...
Security Boulevard
fileless malware

Cyberespionage Group Abuses LoJack Theft Recovery Software

Security researchers have found instances of the Absolute LoJack theft recovery technology phoning back to servers associated with a notorious Russian cyberespionage group known as Fancy Bear. Absolute LoJack, previously known as ...
Security Boulevard
Widely Used WebEx Clients Have Critical Vulnerability

Widely Used WebEx Clients Have Critical Vulnerability

Cisco Systems has released security updates for the software clients installed by users who attend WebEx-based meetings to fix a critical vulnerability that could allow remote attackers to compromise their computers. “An ...
Security Boulevard
Attackers Inject Persistent Cryptomining in Browsers

Attackers Inject Persistent Cryptomining in Browsers

Attackers have found a new technique to make cryptocurrency mining, or cryptomining, inside browsers persistent, or at least survive normal attempts of closing the browser window. Drive-by cryptomining has become widespread in ...