All posts in spearphishing
21 Nov, 2023
advanced persistent threats, Apple, artificial intelligence, Botnets, cyberespionage, Cybersecurity, Developer, Developers, Hackers, International, Kaspersky, Malware, Microsoft, mobile devices, Mobility, rootkits, Security, Security News, smart home tech, spearphishing, supply chain attacks
0

Kaspersky’s new report provides the company’s view on the advanced persistent threats landscape for 2024. Existing APT techniques will keep being used, and new ones will likely emerge, such as the increase in AI usage, hacktivism and targeting of smart home tech. New botnets and rootkits will also likely appear, . . . Read more
17 Oct, 2023
Australia, cloud, cloud apps security, Cloud Security, cloud storage, cloud storage apps, cybercrime, Cybersecurity, International, Malware, Microsoft, microsoft onedrive, Phishing, Security, Security News, spearphishing, Storage
0

A new report from Netskope detailing the top techniques used by cybercriminals to attack organizations found that cloud apps are increasingly being used by threat actors, representing 19% of all clicks on spearphishing links. The report also shed light on the attackers’ targets according to their financial or geopolitical motivations. . . . Read more
12 Sep, 2023
artificial intelligence, Check Point Software, CISO, Cybersecurity, devops, Hackers, hardware, International, Malware, Microsoft, penetration tests, Security, Security News, Spam, spearphishing
0

Image: Timon/Adobe Stock In its 2023 Mid-Year Cyber Security Report, Check Point Software spotlighted numerous exploits so far this year, including novel uses of artificial intelligence and an old-school attack vector: USB drives. Cybercriminals and nation-state actors see these devices as the best way to infect air gapped, segmented and . . . Read more

How can you tell the difference between spear phishing and phishing in a cloud infrastructure? Learn more about the differences with our article. Image: ronstik/Adobe Stock Threat actors love phishing because it works. But how they use it – and where they use it – depends on the type of . . . Read more
24 May, 2023
ai, artificial intelligence, CXO, Cybersecurity, email security, Incident response, Phishing, remote work, Security, Security News, spearphishing, Tech & Work
0

Image: ronstik/Adobe Stock Spearphishing is a sliver of all email exploits, but the extent to which it succeeds is revealed in a new study from cybersecurity firm Barracuda Network, which analyzed 50 billion emails across 3.5 million mailboxes in 2022, unearthing around 30 million spearphishing emails. These findings are in . . . Read more
21 Dec, 2020
best practices, Cloud Security, Cyberattacks, Cybersecurity, Defense, InfoSec Insider, Malware, Mobile Security, nation state, Security News, social engineering, spearphishing, state actors, State sponsored, technical defenses, tips, Vulnerabilities
0

Saryu Nayyar of Gurucul discusses state and state-sponsored threat actors, the apex predators of the cybersecurity world. Security threats from states and state-sponsored actors have been around since before the field of cybersecurity was defined. They have now evolved to cyberspace, and present unique challenges for defenders. While there are . . . Read more
08 Dec, 2020
exact domain spoofing, financial services, Healthcare, Ironscales, manufacturing, Microsoft, Office 365, Security News, spearphishing, Spoofing, telecom, utilities, vertical markets, Web Security
0

It remains unknown as to why Microsoft is allowing a spoof of their very own domain against their own email infrastructure. A spearphishing attack is spoofing Microsoft.com to target 200 million Microsoft Office 365 users in a number of key vertical markets, including financial services, healthcare, manufacturing and utility providers. . . . Read more
02 Dec, 2020
advanced persistent threat, apt, Breach, cisa alert, covid-19. remote access, Cyberattacks, data exfiltration, espionage, exploits, Government, Hacks, Malware, nation states, Phishing, remote working, Security News, spearphishing, Think tanks, vpn, Vulnerabilities, Web Security
0
The feds have seen ongoing cyberattacks on think-tanks (bent on espionage, malware delivery and more), using phishing and VPN exploits as primary attack vectors. The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have issued a warning on what they say are persistent, continued cyberattacks by advanced persistent threat . . . Read more
07 Oct, 2020
attachment, bot, Breach, CISA, Cybersecurity, Department of Homeland Security, DHS, emotet, Emotet Alert, Emotet warning, Government, local government, Malware, mobile, Phishing, Ransomware, Security News, spearphishing, state government, Trojan, virus, warning, worm
0

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
07 Oct, 2020
Armenia, Azerbaijan, Cisco Talos, conflict, Dostoevsky, email, espionage, Government, macros, malicious documents, Malware, Malware analysis, microsoft word, nation state, PoetRAT, public sector, Security News, spearphishing, Spyware, The Brothers Karamazov, threat actors, war, Web Security
0

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.