article thumbnail

Spam and phishing in 2021

SecureList

Our Anti-Phishing system blocked 253 365 212 phishing links. Safe Messaging blocked 341 954 attempts to follow phishing links in messengers. Hurry up and lose your account: phishing in the corporate sector. Another noticeable phishing trend targeting the corporate sector was to exploit popular cloud services as bait.

article thumbnail

Foreign hackers breached Russian federal agencies, said FSB

Security Affairs

FSB National Coordination Center for Computer Incidents (NKTsKI) revealed that foreign hackers have breached networks of Russian federal agencies. Attackers gained access to mail servers, electronic document management servers, file servers, and workstations of various levels to steal data of interest.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Wannacry, the hybrid malware that brought the world to its knees

Security Affairs

In the early afternoon of Friday 12 May 2017, the media broke the news of a global computer security attack carried out through a malicious code capable of encrypting data residing in information systems and demanding a ransom in cryptocurrency to restore them, the Wannacry ransomware. About the author: Salvatore Lombardo.

Malware 98
article thumbnail

Feds Target $100M ‘GozNym’ Cybercrime Network

Krebs on Security

The feds say the ringleader of the group was Alexander Konovolov , 35, of Tbilisi, Georgia, who controlled more than 41,000 victim computers infected with GozNym and recruited various other members of the cybercrime team. Vladimir Gorin , a.k.a The indictment alleges 32-year-old Eduard Malancini , a.k.a. Avalanche was dismantled in Dec.

article thumbnail

How to Protect New Remote Workers Against Cybercrime

SecureWorld News

This should begin with penetration testing, which is the assessment of computer networks, systems, and applications to identify and address security weaknesses. This needs to go beyond the standard advice on setting a strong password and how to spot phishing emails; although, of course, these are still both essential pieces of knowledge.

article thumbnail

Security Affairs newsletter Round 210 – News of the week

Security Affairs

Romanian duo convicted of fraud Scheme infecting 400,000 computers. RCE flaw in Electronic Arts Origin client exposes gamers to hack. Avast, Avira, Sophos and other antivirus solutions show problems after. Google is going to block logins from embedded browsers against MitM phishing attacks. Code execution – Evernote.

article thumbnail

Tax Identity Theft: A Comprehensive Guide

Identity IQ

What Methods Are Employed by Identity Thieves Phishing Identity thieves will create fake emails trying to impersonate an organization to get you to reveal information. Be Wary of Phishing Scams As mentioned, identity thieves use phishing emails to steal victims’ personal information.