Remove Cyber Attacks Remove Information Security Remove Malware Remove Phishing
article thumbnail

Russia-linked APT28 used new malware in a recent phishing campaign

Security Affairs

Ukraine’s CERT (CERT-UA) warned of a new phishing campaign by the APT28 group to deploy previously undocumented malware strains. The Computer Emergency Response Team of Ukraine (CERT-UA) warned of a new cyber espionage campaign carried out by the Russia-linked group APT28 (aka “ Forest Blizzard ”, “ Fancybear ” or “ Strontium ”).

Phishing 117
article thumbnail

IKEA hit by a cyber attack that uses stolen internal reply-chain emails

Security Affairs

Threat actors are targeting IKEA employees in an internal phishing campaign leveraging stolen reply-chain emails. According to BleepingComputer, threat actors are targeting IKEA employees in phishing attacks using stolen reply-chain emails. “There is an ongoing cyber-attack that is targeting Inter IKEA mailboxes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NASA warns of a significant increase in cyber attacks during Coronavirus outbreak

Security Affairs

The memo was obtained by the website SpaceRef, it warns of both phishing attacks and malware-based attacks. According to the advisory issued by NASA, the number of phishing attempts doubled in the past few days, at the same time the number of malware attacks on its systems has grown exponentially.

article thumbnail

Unprecedented cyber attack hit State Infrastructure of Montenegro

Security Affairs

The state Infrastructure of Montenegro was hit by a massive and “unprecedented” cyber attack, authorities announced. An unprecedented cyber attack hit the Government digital infrastructure in Montenegro, the government has timely adopted measures to mitigate its impact. Embassy in the capital Podgorica.

article thumbnail

A phishing campaign targets Ukrainian military entities with drone manual lures

Security Affairs

A phishing campaign targets Ukrainian military entities using drone manuals as lures to deliver the post-exploitation toolkit Merlin. Securonix researchers recently uncovered a phishing campaign using a Pilot-in-Command (PIC) Drone manual document as a lure to deliver a toolkit dubbed Merlin.

article thumbnail

New Cyber Attack Campaign Leverages the COVID-19 Infodemic

Security Affairs

Researchers from Cybaze Yoroi ZLab have spotted a new campaign exploiting the interest in coronavirus (COVID-19) evolution to spread malware. Nowadays, it is common to say that the physical world and the cyber world are strictly connected. The statistics are worrying, and, of course, they represent an opportunity for cyber-crooks.

article thumbnail

What Is Residual Risk in Information Security?

Heimadal Security

It is impossible for any business to convince itself it doesn’t face some kind of cyber-attack risk, considering the threat ecosystem is nowadays so broad and growing each and every day. The post What Is Residual Risk in Information Security? appeared first on Heimdal Security Blog.