Remove Backups Remove Document Remove Phishing Remove Threat Detection
article thumbnail

Dridex malware, the banking trojan

CyberSecurity Insiders

Recent infection on Macs: The recent variant of Dridex malware that targets MacOS systems delivers malicious macros via documents in a new way. The variant overwrites document files to carry Dridex's malicious macros, but currently, the payload it delivers is a Microsoft exe file, which won't run on a MacOS environment.

Banking 78
article thumbnail

Cyber Security: Work From Home Best Practices

Spinone

They include insider threats, phishing, and ransomware. Insider Threats Insider threats include all potential risks of human error or malicious intent. Insider threats are especially serious for remote work. Phishing attacks are tricky, because even one sloppy click can put the whole system in danger.

Backups 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Two hacker groups attacked Russian banks posing as the Central Bank of Russia

Security Affairs

In the morning of 15 November, Group-IB detected a malicious mass email campaign sent to Russian banks from a fake email address purporting to belong to the Central Bank of Russia (CBR). Of course, the CBR does not have anything to do with the phishing campaign – the hackers faked the sender’s address. October attack: MoneyTaker .

Banking 101
article thumbnail

Group-IB detects a series of ransomware attacks by OldGremlin

Security Affairs

As the initial vector of their attacks, OldGremlin use spear phishing emails, to which the group adopted creative approach. In other instances, the gang exploited the COVID-19 theme and anti-government rallies in Belarus in their phishing emails. As a contact email, the threat actors gave an email registered with ProtonMail.

article thumbnail

Cybersecurity for Small Businesses: 7 Best Practices for Securing Your Business Data

Cytelligence

Here are seven best practices for cybersecurity in small businesses: Employee Education and Training: Provide cybersecurity awareness training to your employees, teaching them about common threats such as phishing emails, social engineering, and the importance of strong passwords. WPA2 or WPA3).

article thumbnail

Unveiling the Threat Landscape: Exploring the Security Risks of Cloud Computing

Centraleyes

These plans should align with cloud services, including backup strategies and the ability to restore operations cloud-natively. Social Engineering and Cyberattacks Phishing attacks and social engineering methods continue exploiting technical and human vulnerabilities. How to Secure Data in the Cloud A.

Risk 52
article thumbnail

Office 365 Security Concerns

Spinone

However, attackers can still prey upon basic security holes as well as utilize phishing techniques to lure unsuspecting end users into running executables or installers that ask for permissions to their public cloud stored data or emails. Also, important to consider is the threat vector of file synchronization.

Backups 64