Five Cloud Security Considerations for CISOs

Discover How You Can Protect Users and the Organization in Today’s New Normal The past six months have been a whirlwind of change. Security teams across the world have scrambled to empower ...
Phishing Campaign Targets FINRA in Search for Microsoft Office or SharePoint Credentials

Phishing Campaign Targets FINRA in Search for Microsoft Office or SharePoint Credentials

A new phishing campaign is targeting members of Financial Industry Regulatory Authority (FINRA), with emails purporting to be from FINRA officers. The goal is to obtain the members’ user names and passwords ...
Cybercriminal are using Google reCAPTCHA to hide their phishing attacks

Cybercriminals are using Google reCAPTCHA to hide their phishing attacks

I doubt any of us would claim to be fans of CAPTCHA – the puzzles that a website asks you to complete to prove if you’re a human being or not. Unscrambling ...
Oil & Gas Spearphishing Campaigns Drop Agent Tesla Spyware in Advance of Historic OPEC+ Deal

Oil & Gas Spearphishing Campaigns Drop Agent Tesla Spyware in Advance of Historic OPEC+ Deal

Bitdefender researchers have recently found spearphishing campaigns, either impersonating a well-known Egyptian engineering contractor or a shipment company, dropping the Agent Tesla spyware Trojan. The impersonated engineering contractor (Enppi – Engineering for ...
Netflix Phishing Campaign Spikes in Brazil with Account Update/Suspended Tricks

Netflix Phishing Campaign Spikes in Brazil with Account Update/Suspended Tricks

With many of us stuck at home because of the pandemic, it’s only natural that streaming services will experience a surge in members and traffic. Netflix is clearly among them, and to ...
New Homograph Phishing Attack Impersonates Bank of Valletta, Leverages Valid TLS Certificate

New Homograph Phishing Attack Impersonates Bank of Valletta, Leverages Valid TLS Certificate

Bitdefender researchers recently uncovered a new IDN (internationalized domain name) homograph phishing attack in which attackers impersonate the Bank of Valletta, Malta. Bitdefender’s Deep Learning technologies, trained specifically to spot this type ...
China accused of running industrial cyberespionage operation to steal US aviation and technological data

China accused of running industrial cyberespionage operation to steal US aviation and technological data

Between 2010 and 2015, Chinese operatives together with hackers and company insiders working at a facility in Jiangsu, China, allegedly engaged in a major industrial cyberespionage operation targeting a US – French ...
What is the MITRE ATT&CK™ Framework?

The MITRE ATT&CK Framework: Initial Access

Although ATT&CK is not laid out in any linear order, Initial Access will be the point at which an attacker gains a foothold in your environment. This tactic is a nice transition ...