The threat actor Roaming Mantis has been detected since February, targeting victims across Europe and the Far East. Their attacks are based around phishing text messages, Android users are directed to download a malicious app, whilst Apple users (as the Apple “walled garden” Apps store does an effective job of …
OpenDocument files distributing stealth malware – make sure your team can recognise these types of attack.
This report is from HP’s Threat Research Blog and is about a threat discovered impacting hotels in South America. But it illustrates the wide range of threats that can get to you via an email attachment and has some examples you can look at. Stealthy OpenDocument Malware Deployed Against Latin …
I have told everyone to use MFA so I do not need to think about more cyber security! UPDATED 14 July 2022
This post was original published on 27 June 2022 Update 14 July 2022 Here is an article from the Microsoft Threat Intelligence Center (MSTIC) and the Microsoft 365 Defender Research Team outlining how the big phishing campaigns backed by experienced and skilled hackers can bypass the security of multi-factor authentication: …
More and more phishing attacks – each with their own special touch to exploit the trust of your people!
A UK Government’s report looking at cybersecurity breaches across the country, (UK Government. 2022), prepared by Department for Digital, Culture, Media & Sport (and sport!) showed clearly email phishing is a real threat: “Of the 39% of UK businesses who identified an attack, the most common threat vector was phishing …
Social Engineering to breach security – fake subscription renewals
It may be a new cyber gang but Luna Moth are using the oldest tricks in the book – phishing with social engineering to exploit user’s trust: New ‘Luna Moth’ hackers breach orgs via fake subscription renewals (bleepingcomputer.com) What you and your team need is an awareness of what social …
Continue reading “Social Engineering to breach security – fake subscription renewals”