Headlines
"Unmasking the Invisible Threat: Cybercrime's Year-Round Reign"cybercrime,cybersecurity,onlinethreats,databreaches,hacking,identitytheft,onlinefraud,malware,phishing,ransomware

“Unmasking the Invisible Threat: Cybercrime’s Year-Round Reign”

## Cybersecurity Considerations for the Summer Season As the summer season approaches, cybersecurity professionals are bracing themselves for an increase in cybercriminal activity. The Cybersecurity and Infrastructure Security Agency (CISA) warns that holidays and vacation periods are particularly vulnerable times for organizations, as IT security teams may be lean or preoccupied. In order to manage…

Read More
"Microsoft's Latest Discovery: Banking AitM Phishing and BEC Attacks on Financial Giants"cybersecurity,Microsoft,phishing,BEC,financialinstitutions

“Microsoft’s Latest Discovery: Banking AitM Phishing and BEC Attacks on Financial Giants”

Save Time on Network Security With This Guide: Perimeter 81’s Network Security Platform As cyber attacks become more commonplace, individuals, businesses, and financial institutions must invest in a secure network infrastructure. But with the ever-increasing cyber threats and evolving tactics, IT managers are faced with the daunting task of keeping their systems secure while minimizing…

Read More
The Dangers of 'Picture-in-Picture' Obfuscation Attacks for Stealing Credentialscybersecurity,phishing,picture-in-picture,obfuscation,attacks,credentials,theft

The Dangers of ‘Picture-in-Picture’ Obfuscation Attacks for Stealing Credentials

Hackers Turn to Obfuscation Tactics in Phishing Campaigns Hackers are constantly updating their tactics with new tools and techniques to make their phishing campaigns more convincing and successful. In a recent campaign analyzed by Avanan, cybercriminals hid malicious links behind glossy advertising photos from trusted brands like Delta Airlines and Kohl’s to trick users into…

Read More
Israel Post Impersonated in Ongoing Phishing Campaign Dropping RATsphishing,IsraelPost,RATs,cybersecurity

Israel Post Impersonated in Ongoing Phishing Campaign Dropping RATs

Israeli Companies Targeted in Sustained Phishing Campaign Impersonating Israel Post Israeli engineering and telecommunications companies have been targeted in a sustained phishing campaign, which convincingly impersonates Israel’s postal service. The phishing emails appear as missed delivery notes containing an HTML link. Clicking on the link downloads an .html file attachment on the user’s browser that,…

Read More
How Phishers are Using .ZIP Domains to Lure in Victims.phishing,.zipdomains,cybercrime,onlinesecurity,emailscams

How Phishers are Using .ZIP Domains to Lure in Victims.

[object Object] Cybersecurity.-phishing,.zipdomains,cybercrime,onlinesecurity,emailscams > You might want to read ! Pondering the fallout from ABB’s recent ransomware attack and data theft Exploring the Impact of the Critical OAuth Vulnerability in the Expo Framework on Account Security: A Commentary. “Open Sesame: A Dualistic Approach to Assessing the Security of Open Source Software” The Vulnerability of IoT…

Read More
Exploring the Growing Threat of Sophisticated Travel-Related Phishing and BEC Scams This Summer.phishing,BECscams,travel-related,cybersecurity,summerthreats

Exploring the Growing Threat of Sophisticated Travel-Related Phishing and BEC Scams This Summer.

Phishing Scams with Travel-Themed Lures Ramp Up Ahead of Summer Holiday Season As the summer holiday season approaches, phishing scams with travel-themed lures are gaining momentum, posing a significant threat to individuals and organizations alike. A recent survey by McAfee found that almost one-third (30%) of adults have either fallen victim to, or know someone…

Read More
Ransomware Campaigns: Unpacking the Three Common Initial Attack Vectorsmalware,cybersecurity,ransomware,attackvectors,phishing,socialengineering,vulnerabilityexploitation

Ransomware Campaigns: Unpacking the Three Common Initial Attack Vectors

Increasing Use of Initial Access Vectors for Ransomware Attacks An Overview According to a recently released report by Kaspersky, the most significant vector in successful ransomware attacks in 2022 involved the exploitation of public-facing applications, accounting for 43% of all breaches. This was followed by the use of compromised accounts at 24% and malicious email…

Read More