Drupal, Phishing and A New Cryptomining Botnet

Drupal, Phishing and A New Cryptomining Botnet

It’s a well-known fact that security solutions must quickly adapt to new attack methods. There are several ways to achieve this goal, regularly applying security patches and updates, relying on threat intelligence ...

Tabnabbing

| | Phishing
What is Tabnabbing? As described by Aza Raskin, tabnabbing goes like this: when a simple JavaScript detects that the user has moved to another browser tab or has been inactive for some ...
Interesting Email Scam I Recieved

Interesting Email Scam I Recieved

I received an impressive email scam recently. My response was to forward it to the email provider’s abuse contact (abuse@outlook.com) and file a complaint with the Internet Crime Complaint Center (ic3.gov). I’ll ...
Free Yourself from FUD

Free Yourself from FUD

Fear, uncertainty, and doubt (FUD) hold powerful influence over humans. Fear itself is a deeply powerful emotion that causes specific reactions in the brain, and uncertainty and doubt are feelings that manipulate ...

When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained

Maybe it’s the quirky way some tech writers abbreviate it, or the surreal way it reminded you of that popular Michael Jackson song. Whatever triggers you to remember the term, for most ...
A WordPress SPAMbot Wants You to Bet on the 2018 FIFA World Cup

A WordPress SPAMbot Wants You to Bet on the 2018 FIFA World Cup

Our researchers recently picked up on a spike in SPAM activity directed at sites powered by WordPress, which, naturally, led them to take a closer look. Turns out the attack was launched ...
Credential Phishing – Easy Steps to Stymie Hackers

Credential Phishing – Easy Steps to Stymie Hackers

Phishing attacks have become a common factor in our daily routines for businesses and in our personal lives. There are many different types of phishing attacks, each of which requires a slightly ...
Using Reported Phish to Hunt Threats

Using Reported Phish to Hunt Threats

| | Phishing, Threat analysis
Reported phishing emails are useful for plenty of reasons ...
Wisconsin County Reveals Phishing Attack Most Likely to Blame for Data Breach

Wisconsin County Reveals Phishing Attack Most Likely to Blame for Data Breach

A county in Wisconsin revealed that a phishing attack was most likely to blame for a data breach of some service recipients’ personal information. On 22 June, Manitowoc County posted a statement ...
A Scam Which Preys on Vulnerable People (and Works!)

A Scam Which Preys on Vulnerable People (and Works!)

| | Phishing, security
This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people The post A Scam Which Preys on Vulnerable People (and Works!) appeared first on Rainbow and Unicorn ...
Loading...