Archive for the ‘Phishing’ Category

How Coinbase Phishers Steal One-Time Passwords

A recent phishing campaign targeting Coinbase users shows thieves are getting smarter about phishing one-time passwords (OTPs) needed to complete the login process. It also shows that phishers are attempting to sign up for new Coinbase accounts by the millions as part of an effort to identify email addresses that are already associated with active accounts. Coinbase […]

Leave a Comment

Cybersecurity awareness month: Fight the phish!

It’s the second week of Cybersecurity Awareness Month 2021, and this week’s theme is an alliterative reminder: Fight the Phish! Unfortunately, anti-phishing advice often seems to fall on deaf ears, because phishing is an old cybercrime trick, and lots of people seem to think it’s what computer scientists or mathematical analysts call a solved game. Tic-tac-toe (noughts and […]

Leave a Comment

Hackers Are Going ‘Deep-Sea Phishing,’ So What Can You Do About It?

Nick Kael, CTO at Ericom, discusses how phishing is gaining sophistication and what it means for businesses. Hackers are upping their game, using an approach I call “Deep Sea Phishing,” which is the use of a combination of the techniques described below to become more aggressive. To keep pace, cybersecurity innovators have been working diligently […]

Leave a Comment

Phishing Staff Awareness Training

Microsoft has been warning of a “widespread” phishing campaign in which fraudsters use open redirect links to lure users to malicious websites to harvest Office 365 and other credentials. ITG Phishing Staff Awareness Training Program educates your staff on how to respond to these types phishing attacks 📧 Phishing Staff Awareness E-Learning Course

Leave a Comment

Men, Executives Pose Higher Cybersecurity Risk

When it comes to online behaviors, women are far safer than men, according to a wide-ranging survey from SecurityAdvisor. Despite the fact that women made up 42% of the sample data, they account for 48% of the top safe users and only 26% of risky users. Men, on the other hand, account for 74% of risky […]

Leave a Comment

Crooks use Telegram bots and Google Forms to automate phishing

Group-IB, a global threat hunting and adversary-centric cyber intelligence company, has found that cybercriminals increasingly often use legitimate services such as Google Forms and Telegram to obtain user data stolen on phishing websites. Alternative ways to obtain data help cybercriminals keep it safe and start using the information immediately. In addition, ready-to-go platforms that automate phishing and which are available on […]

Leave a Comment

Catches of the month: Phishing scams for March 2021

Leave a Comment

How to Keep your Company safe from Phishing Attacks

Leave a Comment

Security Awareness – Phishing and Ransomware

Leave a Comment

Key 2021 Insights: Proactive Security Needed for Ransomware, Phishing

Healthcare leaders will need to shift into a proactive security approach into 2021, if they hope to defend against the onslaught of ransomware and phishing threats. The ransomware surge during the last few months has already continued into 2021. And though the malware will remain a key trend into this year, healthcare industry stakeholders will need […]

Leave a Comment

SMS phishing scam pretends to be Apple “chatbot” – don’t fall for it!

If you got someone else’s “free offer” in what looked like a misdirected message, would you take a peek? Dear Christopher, we have your packet in queue. Address: Londonderry, Ballynagard crescent http COLON SLASH SLASH xxxxxxxx DOT com SLASH zzzzzzz The message is meant to look as though it was sent to the wrong number, […]

Leave a Comment

CISA alerts of phishing attack targeting SBA loan relief accounts

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday released an alert about phishing attacks targeting various government organizations to steal logins for the Small Business Administration COVID-19 loan relief accounts. In a newer phishing attack that started in August, security researchers saw the threat actor using convincing tricks to fool potential victims into […]

Leave a Comment

Twitter says a spear phishing attack led to the huge bitcoin scam

Twitter shared an update in a blog post and tweets Thursday night. Source: Twitter says a spear phishing attack led to the huge bitcoin scam Twitter Says It Knows How Hackers Gained Access What is spear phishing? Phishing Scams Download a Security Risk Assessment Steps paper! Subscribe to DISC InfoSec blog by Email Take an […]

Leave a Comment

10 Ways to Identify a Phishing site

Cybercriminals create fake websites, malicious emails, text message or phone calls to trick people into clicking on links or revealing sensitive information. Source: 10 Ways to Identify a Phishing site | The PC Hero Phishing Attack Example – How to Spot a Scam Email Phishing Scam Download a Security Risk Assessment Steps paper! Subscribe to […]

Leave a Comment

To test its security mid-pandemic, GitLab tried phishing its own work-from-home staff. 1 in 5 fell for it

Welp, at least that’s better than industry averages, says code-hosting biz Source: To test its security mid-pandemic, GitLab tried phishing its own work-from-home staff. 1 in 5 fell for it The mock attack simulated a targeted phishing campaign designed to get GitLab employees to give up their credentials. The GitLab Red Team – security personnel […]

Leave a Comment

Q3 2019 Top-Clicked Phishing Email Subjects from KnowBe4 [INFOGRAPHIC]

Q3 2019 Top-Clicked Phishing Email Subjects from KnowBe4. Users continue to fall for LinkedIn, Facebook, and security-minded messages. See the full report! Source: Q3 2019 Top-Clicked Phishing Email Subjects from KnowBe4 [INFOGRAPHIC] This is what happens when you reply to spam email | James Veitch How to Spot a Phishing Email I Fortune Anatomy of […]

Leave a Comment

A guide to phishing emails and how they work -TEISS® : Cracking Cyber Security

Security Awareness writer Keil Hubert describes a mysterious email message that could well have been an insidiously clever spear phishing attack. Source: A guide to phishing emails and how they work -TEISS® : Cracking Cyber Security This is what happens when you reply to spam email  Subscribe in a reader

Leave a Comment

From phish to network compromise in two hours: How Carbanak operates

Cybercriminal group Carbanak has stolen hundreds of millions of dollars from financial institutions. Here’s a detailed analysis by Bitdefender of an attack on one bank. Source: From phish to network compromise in two hours: How Carbanak operates

Leave a Comment

Anatomy of a spearphishing attack

Anatomy of a spear phishing attack You may be wondering what it takes to send this type of attack. This is not trivial, and can only be done by someone trained in advanced hacking techniques. We will first take a look at the steps required to send an attack, and then we’ll look at steps […]

Leave a Comment

The ABCs of Detecting and Preventing Phishing

Stay out of the phishing net with these actionable tips – here’s how you can detect and prevent phishing attacks. Source: The ABCs of Detecting and Preventing Phishing  

Leave a Comment