This post was original published on 27 June 2022 Update 14 July 2022 Here is an article from the Microsoft Threat Intelligence Center (MSTIC) and the Microsoft 365 Defender Research Team outlining how the big phishing campaigns backed by experienced and skilled hackers can bypass the security of multi-factor authentication: …
More and more phishing attacks – each with their own special touch to exploit the trust of your people!
A UK Government’s report looking at cybersecurity breaches across the country, (UK Government. 2022), prepared by Department for Digital, Culture, Media & Sport (and sport!) showed clearly email phishing is a real threat: “Of the 39% of UK businesses who identified an attack, the most common threat vector was phishing …
Social Engineering to breach security – fake subscription renewals
It may be a new cyber gang but Luna Moth are using the oldest tricks in the book – phishing with social engineering to exploit user’s trust: New ‘Luna Moth’ hackers breach orgs via fake subscription renewals (bleepingcomputer.com) What you and your team need is an awareness of what social …
Continue reading “Social Engineering to breach security – fake subscription renewals”
Near-undetectable malware
There are claims from Palo Alto Networks’ Unit 42 threat intelligence team that they have discovered a nearly undetectable strain of malware. The malware is contained in a CV for Roshan Bandara, but rather than the normal .pdf or Word file it is an image file -.iso. Near-undetectable malware linked …
.html Email attachment threats
We all look out for those malicious .pdf, Word and Excel attachments, when we are looking through our email. Research has now shown that the attached html file can be a huge threat. HTML attachments found to be the most malicious type of file | TechRepublic It is a difficult …