Research is showing that with Microsoft now blocking Office VBA macros from the internet, threat actors are moving to other attachments that can execute malicious instructions, such as Windows Shortcut .lnk, .iso and .rar. As Microsoft blocks Office macros, hackers find new attack vectors (bleepingcomputer.com) My advice: Make sure your …
Phishing-as-a-Service – called “Robin Banks” you know it is going to be trouble.
Phishing attacks are highly successful for threat actors, now they can be executed by gangs with less technical ability as they can buy it in: New ‘Robin Banks’ phishing service targets BofA, Citi, and Wells Fargo (bleepingcomputer.com) You need to be ready
Windows Calculator as an attack vector
Threat actors have to find a way to get their malware onto your systems – phishing emails is an obvious method – Qakbot malware is the next step. This malware also known as Qbot, has been found to be to be intermediate software used by threat actors to infect victim’s …
It all starts with a phishing email
In most of our business cyber security training and work, we eventually get to the question of how cyber security defences are breached – and most often the answer is, using email. Even the biggest cyber criminal gangs attacking the highest profile targets, just use email. North Korean hackers attack …
Email scams – how hard is it to spot them?
This was going to be a “weekend read” but I thought it was important enough to be part of the main news feed. For an email phishing scam to work it has to, in some way, make you trust it. This exploitation of your trust is called social engineering and …
Continue reading “Email scams – how hard is it to spot them?”