Organizations have to acknowledge their responsibility for ensuring their employees are able to recognize targeted phishing attacks, according to James McGachie, Legal Director of DLA Piper Scotland. Writing in The Herald, McGachie explains that sophisticated spear phishing attacks designed to steal large amounts of money (also known as “whaling”), should be of special concern to […]
How Phishing is Evolving
Attackers are always using new tactics to stay ahead of defenders, and Microsoft’s Office 365 Threat Research Team describes three noteworthy phishing techniques they’ve observed in 2019. The first was the use of hijacked search results to redirect users to malicious sites. Attackers used a traffic generator to artificially push a baited website to the […]
Dancing with Hackers
Dancing with the Stars pro Witney Carson announced on Twitter that her Facebook account had been hacked. Unknown miscreants gained control of Carson’s Facebook through a unique phishing technique and proceeded to upload spamming material to not only her page, but resharing items to other celebrity pages. Now, there are two questions that immediately come […]
Social Engineering via Elder Scrolls
Scammers are going after Elder Scrolls Online accounts by posing as the game’s developers and informing players that their accounts will be banned unless they hand over their credentials, BleepingComputer reports. The fraudsters convey their scam by PlayStation private messages, and that makes it difficult for the recipients to verify the legitimacy of the sender’s […]
New Ransomware Attack Reboots Systems into Safe Mode to Bypass Antivirus!
The latest strain of Snatch ransomware performs a devious task to ensure tools designed to protect against ransomware are nowhere to be found during encryption. This one is pure evil genius! The latest variant of Snatch has been identified by the researchers at Sophos. Infecting Windows 7 through 10 (in both 32-bit and 64-bit versions), […]
Global Utilities See Cyberattacks as Greater Threat to Operations than IT with Half Experiencing Outages
Global industrial organizations are seeing and feeling the effects of cyberattacks, recognizing the material impact potential upon operations. The latest report from Ponemon and Siemens, entitled Are Utilities Keeping Up with the Industrial Cyber Threat?, discusses the current operational readiness of global utilities. According to the report, over half (56%) of global utilities report at […]
Pervasive Ransomware Infection Cost German Software Company Pilz Tens Of Millions Of Euros
A pervasive ransomware infection cost the German automation company Pilz an estimated tens of millions of euros, says Jan Tournois, director of the Dutch department of the multinational. Pilz systems became infected with the BitPaymer ransomware in mid-October, which is used for targeted attacks. All server-based offices were affected by the attack. The black hats […]
Business Email Compromise Topples Over $26 Billion in Losses
This lucrative business of tricking companies into fraudulently transferring funds into cybercriminal-owned bank accounts is showing signs of growing. Scammers use many forms of attack to attempt to separate your organization from its’ money. BEC—aka CEO Fraud— is one of the easiest; using little more than really good social engineering in some cases, the bad […]
You Can’t Always Trust a Dot-Gov Domain
It may be easier than one thinks to register a dot-gov domain, according to KrebsOnSecurity. People have tended to regard urls with the top-level domain dot gov as generally reliable, but this may need to change. KrebsOnSecurity says it “received an email from a researcher who said he got a .gov domain simply by filling […]
A Look at Cryptocoin Scams
Scammers are taking advantage of the allure of new cryptocurrencies to trick people who want to get in early on the next Bitcoin, according to Naked Security. Criminals set up Initial Coin Offerings (the cryptocurrency version of an Initial Public Offering, or IPO) and invite people to invest in their new currency while it’s still […]