WordPress as a threat to a secure internet – this is why you need to attend our training course – social engineering attacks are everywhere

phishing email threat

It is a long title but it explains exactly what this post is about. The instructions for setting up simple but profitable social engineering and phishing email campaigns are easily available across the ordinary internet, not just the dark web. The software required is free, both the malicious stuff and …

There may not be direct cyber attacks from the Russia Ukraine conflict but others are taking advantage of the situation

Researchers at Google have been tracking various phishing cyber attacks, that are exploiting the Russia Ukraine conflict, but originate from other countries. China, Iran, North Korea, Russia and others using Ukraine invasion in phishing attacks: Google – The Record by Recorded Future Both state sponsored and financially motivated groups are …

IcedID Malware – something you do not want run – so check your Exchange server

There are reports of hackers exploiting Microsoft Exchange servers, that have not been patched, to distribute spam email infected with IcedID malware. If you do run IcedID on your PC, the malware compromises the security of your machine opening a backdoor for other malware to be injected into your computer. …

Do you know what an .xlsb file is? The hackers do and it is another way to obscure their malicious payloads

Here is yet another email attachment, examined by Xme, at SANS Internet Storm and for you to look out for: XLSB Files: Because Binary is Stealthier Than XML – Sans Internet Storm Centre For phishing attacks to succeed the hackers need to exploit your trust – for them to fail …