Phishing campaigns usually depend on social engineering and threat actors are always looking for new ways to exploit your trust: Phishing scam adds a ‘chatbot-like’ twist to steal credit card information and more – The Record by Recorded Future
Is the Conti gang really gone?
The Conti cyber-crime gang has featured in many of my blog post – they have been a prolific perpetrator of some of the worse cyber attacks. Now researchers are reporting that much of their illicit infrastructure has closed down: Notorious cybercrime gang Conti ‘shuts down,’ but its influence and talent …
More on Bumblebee malware – detailed attack examination
Following the emergence of Bumblebee malware as a significant threat, SANS INternet Storm has a post looking at the function of the malware and transferring ISO files. Bumblebee Malware from TransferXL URLs – SANS Internet Storm Centre This is an excellent post by Brad and not only shows you the …
Continue reading “More on Bumblebee malware – detailed attack examination”
Make money fast – the classic social engineering phishing campaign
I try and highlight the variety of social engineering phishing emails doing the rounds as awareness among your people about the ways they are having their trust exploited, when they check their email, is essential for them to beat the threat actors. Here is another one taken apart by the …
Continue reading “Make money fast – the classic social engineering phishing campaign”
Life cycle of a vulnerability
I spend a lot of time with clients, in training courses and on this blog, explaining the significance of the “zero day” issue and how every organisation (and individual) needs to have a plan to deal with it. This post from SANS Internet Storm looks at the life cycle of …