3 Alert Sources That Will Keep Your SOC Busy and Welcome Automation in 2021

3 Alert Sources That Will Keep Your SOC Busy and Welcome Automation in 2021

With the work-from-home shift showing little signs of letting up and new IT spending habits taking shape, organizations should prepare... The post 3 Alert Sources That Will Keep Your SOC Busy and ...
Email Attacks Using Fear of Election Interference to Spread QBot

Email Attacks Using Fear of Election Interference to Spread QBot

Digital attackers launched a malicious email campaign that used fear of election interference in order to spread the QBot trojan. On November 4, Malwarebytes came across an attack email. This message arrived ...
Amazon Discloses Security Incident Involving Customers’ Email Addresses

Amazon Discloses Security Incident Involving Customers’ Email Addresses

Amazon informed some of its customers about a security incident that involved the unauthorized disclosure of their email addresses. News of the security incident emerged over the weekend of October 23 when ...
DOJ Says Iran Targeted American Voters with Threatening Emails

DOJ Says Iran Targeted American Voters with Threatening Emails

The U.S. Department of Justice (DOJ) said Iran was responsible for an attack campaign that targeted American voters with threatening emails. On October 21, the Justice Department held a press conference in ...
“Proud Boys” Emails Are Bogus

“Proud Boys” Emails Are Bogus

| | Elections, email, security, Spam, Trump
The Proud Boys emails aren't actual threats. They're the lowest form of anonymous spam ...
NetworkMiner 2.6

NetworkMiner 2.6 Released

We are happy to announce the release of NetworkMiner 2.6 today! The network forensic tool is now even better at extracting emails, password hashes, FTP transfers and artifacts from HTTP and HTTP/2 ...
NetworkMiner 2.6

NetworkMiner 2.6 Released

We are happy to announce the release of NetworkMiner 2.6 today! The network forensic tool is now even better at extracting emails, password hashes, FTP transfers and artifacts from HTTP and HTTP/2 ...
Targeted Company’s Homepage Used in Message Quarantine Phish

Targeted Company’s Homepage Used in Message Quarantine Phish

Security researchers observed that malicious actors had incorporated a targeted company’s homepage into a message quarantine phishing campaign. The Cofense Phishing Defense Center found that the phishing campaign began with an attack ...
Phishing Campaign Uses Internal Email to Trick Employees into Sharing Office 365 Credentials

Phishing Campaign Uses Internal Email to Trick Employees into Sharing Office 365 Credentials

A campaign targeting Office 365 customers used a compromised internal email for phishing messages, giving much more credence to an email that people would otherwise dismiss immediately. Phishing emails are a fact ...
Phishing Campaign Leads Users to Site Disguised as Email Scanner

Phishing Campaign Leads Users to Site Disguised as Email Scanner

A phishing campaign tricked users into visiting a website that masqueraded as an email scanner in an effort to steal their account credentials. Kaspersky Lab found that the campaign began with a ...