article thumbnail

Threat Report Portugal: Q3 & Q4 2022

Security Affairs

The Threat Report Portugal: H2 2022 compiles data collected on the malicious campaigns that occurred from July to December, H2, 2022. This makes it a reliable, trustworthy, continuously updated source, focused on the threats targeting Portuguese citizens. The submissions were classified as either phishing or malware.

article thumbnail

Security Affairs newsletter Round 442 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

North Korea-linked APT groups actively exploit JetBrains TeamCity flaw Multiple APT groups exploited WinRAR flaw CVE-2023-38831 Californian IT company DNA Micro leaks private mobile phone data Threat actors have been exploiting CVE-2023-4966 in Citrix NetScaler ADC/Gateway devices since August A flaw in Synology DiskStation Manager allows admin account (..)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Roundup September 2023

BH Consulting

Business Email Compromise: a scam on the rise Business email compromise (BEC) scams are raking in more cash for fraudsters, who are evolving their tactics to avoid detection. Among the most popular lures and themes for the scams were payroll diversion, where the scammer asks to change their bank account or direct debit information.

Scams 59
article thumbnail

Actors of Badness Exploit NCAA March Madness

SecureWorld News

Scams will also target consumers for fake merchandise, phony tickets, etc." According to the 2022 Global Mobile Threat report, mobile-specific phishing sites grew by 50% over a three year period. Darren Guccione, CEO and Co-Founder, Keeper Security: "Phishing and online scams are two of the biggest cyber threats for fans.

article thumbnail

Security Affairs newsletter Round 373 by Pierluigi Paganini

Security Affairs

Unfaithful HackerOne employee steals bug reports to claim additional bounties Threat Report Portugal: Q2 2022 CISA orders federal agencies to patch CVE-2022-26925 by July 22 Tens of Jenkins plugins are affected by zero-day vulnerabilities Microsoft: Raspberry Robin worm already infected hundreds of networks. Upgrade it now!

article thumbnail

Hacker Personas Explained: Know Your Enemy and Protect Your Business

Webroot

An impersonation attack recently made headlines with the 2020 Twitter/Bitcoin scam , in which 130 high-profile Twitter accounts were compromised by outside parties to steal bitcoin. This is a scam that’s been around for years and since no one can reverse a cryptocurrency transaction, it’s very likely here to stay.

Scams 108
article thumbnail

Key Insights from the OpenText 2024 Threat Perspective

Webroot

As we navigate through 2024, the cyber threat landscape continues to evolve, bringing new challenges for both businesses and individual consumers. The latest OpenText Threat Report provides insight into these changes, offering vital insights that help us prepare and protect ourselves against emerging threats.