Threat actors have to host their malicious login stealing pages somewhere – why not in Amazon’s cloud: Hiding a phishing attack behind the AWS cloud
Tourist rebound after COVID-19 is an obvious target for phishing attacks
Research company Proofpoint, has shown that the threat actor, tracked as TA558, has increased it’s phishing campaigns targeted at hotel and travel companies, to coincide with the rapid increase in foreign travel as the pandemic decreases. Hackers target hotel and travel companies with fake reservations (bleepingcomputer.com) Threat actors are always …
Continue reading “Tourist rebound after COVID-19 is an obvious target for phishing attacks”
Microsoft takes action to disrupt ongoing persistent phishing and credential theft campaigns
Microsoft’s Threat Intelligence Centre (MSTIC) has shared an article outlining how the actions they have undertaken to disrupt the Russian threat actor, SEABORGIUM, phishing and credential theft campaigns. Disrupting SEABORGIUM’s ongoing phishing operations – Microsoft Security Blog
Phishing attacks are meant to deceive everyone…
Even someone like me and Dan Goodwin, who wrote the linked article – people who work in cybersecurity all the time. I’m a security reporter and got fooled by a blatant phish | Ars Technica It is worth reading to see what you are dealing with, when it comes to …
Continue reading “Phishing attacks are meant to deceive everyone…”
Ransomware highlights from Bleeping Computers
There are a rush of ransomware stories on Bleeping computers, mainly high profile organisations being hit, not only with crypto-malware but being blackmailed over data exfiltrated by the threat actors. Automotive supplier breached by 3 ransomware gangs in 2 weeks (bleepingcomputer.com) Hacker uses new RAT malware in Cuba Ransomware attacks …
Continue reading “Ransomware highlights from Bleeping Computers”