article thumbnail

State of Cybersecurity in Canada 2025: Key Insights for InfoSec Leaders

SecureWorld News

Ransomware and state-sponsored attacks continue to escalate Canada's critical sectorsincluding healthcare, energy, education, and retailhave become prime targets for cybercriminals. Sector-specific challenges Energy & Utilities: Legacy OT systems and third-party risks expose critical infrastructure to ransomware.

InfoSec 75
article thumbnail

A massive phishing campaign using QR codes targets the energy sector

Security Affairs

A phishing campaign employing QR codes targeted a leading energy company in the US, cybersecurity firm Cofense reported. “Beginning in May 2023, Cofense has observed a large phishing campaign utilizing QR codes targeting the Microsoft credentials of users from a wide array of industries.” ” continues the report.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT threat evolution Q3 2024

SecureList

The malware utilizes cloud resources for its C2 (command and control) servers, which it accesses via APIs using authentication tokens. Interestingly, Twelve shares infrastructure, utilities and TTPs (Tactics, Techniques and Procedures) with the DARKSTAR ransomware group (formerly known as Shadow or COMET).

article thumbnail

News alert: Beazley reports on how AI, new tech distract businesses as cyber risk intensifies

The Last Watchdog

Bantick “As the MOVEit hack has proved, the bad actors are always looking for new ways to attack with tactics ranging from third party supplier attacks to more sophisticated social engineering and phishing attack techniques.

article thumbnail

Social Engineering – The Mental Game, Part I.

NopSec

The first thing that all organizations need to understand is why social engineering works. In its simplest form, social engineering is an attack that focuses on the human element in the security context. There are a few inherently human qualities that social engineers leverage as part of their attack.

article thumbnail

Zanubis in motion: Tracing the active evolution of the Android banking malware

SecureList

The threat actors behind Zanubis continue to refine its code adding features, switching between encryption algorithms, shifting targets, and tweaking social engineering techniques to accelerate infection rates. To retrieve the APK, the dropper leverages the PackageInstaller class. This technique is employed to evade detection.

Banking 70
article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

As a matter of fact, the most-reported crime in the 2021 Internet Crime Report report was phishing , a social engineering scam wherein the victim receives a deceptive message from someone in an attempt to get the victim to reveal personal information or account credentials or to trick them into downloading malware. Social Tactics.