Remove Blog Remove Education Remove Social Engineering Remove Threat Reports
article thumbnail

Threat Report Portugal: Q3 & Q4 2022

Security Affairs

The Threat Report Portugal: H2 2022 compiles data collected on the malicious campaigns that occurred from July to December, H2, 2022. This makes it a reliable, trustworthy, continuously updated source, focused on the threats targeting Portuguese citizens. The submissions were classified as either phishing or malware.

article thumbnail

Security Roundup September 2023

BH Consulting

It’s a scrollable online guide, written in plain English with graphics aimed at educating an audience that’s not necessarily familiar with the finer points of privacy law. Its 2023 phishing threats report combines findings from email security data with a survey of security decision makers.

Scams 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacker Personas Explained: Know Your Enemy and Protect Your Business

Webroot

As we mentioned in a previous blog , hackers come in many forms, but their methods can generally be classified into three distinct types of cybercriminals: The Impersonator – Hackers that pretend to be others, often using social engineering and human psychology to trick users.

Scams 108
article thumbnail

How Frankfurt Stopped Emotet In Its Tracks

McAfee

There are several steps you can take to keep Emotet from establishing a stronghold in your network: Educate Your Employees: The most important step is to educate your employees on how to identify phishing and social engineering attempts. Above all, don’t fall into the trap of thinking it couldn’t happen to you.

article thumbnail

Remote Work is Here to Stay, and Other Cybersecurity Predictions for 2021

Webroot

The security measures they take (or don’t), the educational opportunities they provide (or fail to) and their commitment to innovation (or lack thereof) will likely separate the winners from the losers in the year ahead. Hal Lonas, CTO and SVP of SMB engineering, Carbonite + Webroot. Home networks and their configurations are diverse.

article thumbnail

APT trends report Q1 2021

SecureList

In November and December 2020, two public blog posts were published about this campaign. The threat actor relied on VBS-based malware to infect organizations from government, NGO and education sectors. Our telemetry, however, indicates that no further tools were deployed and we do not believe that data theft took place either.

Malware 142
article thumbnail

APT trends report Q3 2022

SecureList

We have been tracking this threat actor for several years and previously published an APT threat report describing its malicious operations. Earlier this year, Symantec published a report describing a campaign called Antlion, which has been observed targeting financial institutions in Taiwan. Final thoughts.

Malware 142