article thumbnail

Office 365 phishing campaign uses redirector URLs and detects sandboxes to evade detection

Security Affairs

“We’re tracking an active credential phishing attack targeting enterprises that uses multiple sophisticated methods for defense evasion and social engineering,” reads a message published by Microsoft via Twitter. pic.twitter.com/YpUVEfmlUH — Microsoft Security Intelligence (@MsftSecIntel) November 16, 2020.

Phishing 130
article thumbnail

Crooks spread malware via pirated movies during COVID-19 outbreak

Security Affairs

— Microsoft Security Intelligence (@MsftSecIntel) April 28, 2020. ” reads the Tweet published by the Microsoft Security Intelligence team. . ” reads the Tweet published by the Microsoft Security Intelligence team.

Malware 81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Iran-linked APT groups continue to evolve

Security Affairs

Learn more from this blog summarizing these trends, as presented at #CyberWarCon : [link] — Microsoft Security Intelligence (@MsftSecIntel) November 16, 2021. Since September 2020, researchers analyzed the ransomware operations conducted by six Iranian threat groups that were launched in waves every six to eight weeks on average.

VPN 97
article thumbnail

2022: The threat landscape is paved with faster and more complex attacks with no signs of stopping

Webroot

2020 may have been the year of establishing remote connectivity and addressing the cybersecurity skills gap, but 2021 presented security experts, government officials and businesses with a series of unpresented challenges.

article thumbnail

Remote Work is Here to Stay, and Other Cybersecurity Predictions for 2021

Webroot

Read on for more details from leading engineers, security analysts and product specialists from around our organization for complete cybersecurity predictions for 2021. Take heart because, whatever happens, 2020 won’t be easily outdone (knock on wood). David Dufour, VP of engineering, Carbonite + Webroot.

article thumbnail

7 Insights About Managing Cyber Risk You Can’t Afford To Miss

Jane Frankland

That could be through common hacking techniques like phishing, bait and switch, cookie theft, deep fake , password cracking , social engineering , and so on. Security intelligence comes with a high pay off. They make guarantees, offer support contracts, and will find a way into your organisation.