SpearPhishing
Five Cloud Security Considerations for CISOs
Discover How You Can Protect Users and the Organization in Today’s New Normal The past six months have been a whirlwind of change. Security teams across the world have scrambled to empower ...
Phishing Campaign Targets FINRA in Search for Microsoft Office or SharePoint Credentials
A new phishing campaign is targeting members of Financial Industry Regulatory Authority (FINRA), with emails purporting to be from FINRA officers. The goal is to obtain the members’ user names and passwords ...
Cybercriminals are using Google reCAPTCHA to hide their phishing attacks
I doubt any of us would claim to be fans of CAPTCHA – the puzzles that a website asks you to complete to prove if you’re a human being or not. Unscrambling ...
Oil & Gas Spearphishing Campaigns Drop Agent Tesla Spyware in Advance of Historic OPEC+ Deal
Bitdefender researchers have recently found spearphishing campaigns, either impersonating a well-known Egyptian engineering contractor or a shipment company, dropping the Agent Tesla spyware Trojan. The impersonated engineering contractor (Enppi – Engineering for ...
Netflix Phishing Campaign Spikes in Brazil with Account Update/Suspended Tricks
With many of us stuck at home because of the pandemic, it’s only natural that streaming services will experience a surge in members and traffic. Netflix is clearly among them, and to ...
New Homograph Phishing Attack Impersonates Bank of Valletta, Leverages Valid TLS Certificate
Bitdefender researchers recently uncovered a new IDN (internationalized domain name) homograph phishing attack in which attackers impersonate the Bank of Valletta, Malta. Bitdefender’s Deep Learning technologies, trained specifically to spot this type ...
China accused of running industrial cyberespionage operation to steal US aviation and technological data
Between 2010 and 2015, Chinese operatives together with hackers and company insiders working at a facility in Jiangsu, China, allegedly engaged in a major industrial cyberespionage operation targeting a US – French ...
The MITRE ATT&CK Framework: Initial Access
Although ATT&CK is not laid out in any linear order, Initial Access will be the point at which an attacker gains a foothold in your environment. This tactic is a nice transition ...
Monday, July 16: Dtex, Insider Threat News: Privileged User Dents Apple Self-Driving Car Program; DOJ Says Russia Hacked Clinton Campaign, Issues Indictments Against Spies
Last week, Apple found out it had an insider threat active in its ranks. It was the type of insider that Dtex and the industry commonly refers to as a “leaver." In ...

