article thumbnail

State of Cybersecurity in Canada 2025: Key Insights for InfoSec Leaders

SecureWorld News

Ransomware and state-sponsored attacks continue to escalate Canada's critical sectorsincluding healthcare, energy, education, and retailhave become prime targets for cybercriminals. Sector-specific challenges Energy & Utilities: Legacy OT systems and third-party risks expose critical infrastructure to ransomware.

InfoSec 77
article thumbnail

A massive phishing campaign using QR codes targets the energy sector

Security Affairs

A phishing campaign employing QR codes targeted a leading energy company in the US, cybersecurity firm Cofense reported. “Beginning in May 2023, Cofense has observed a large phishing campaign utilizing QR codes targeting the Microsoft credentials of users from a wide array of industries.” ” continues the report.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT threat evolution Q3 2024

SecureList

The malware utilizes cloud resources for its C2 (command and control) servers, which it accesses via APIs using authentication tokens. Interestingly, Twelve shares infrastructure, utilities and TTPs (Tactics, Techniques and Procedures) with the DARKSTAR ransomware group (formerly known as Shadow or COMET).

article thumbnail

Zanubis in motion: Tracing the active evolution of the Android banking malware

SecureList

The threat actors behind Zanubis continue to refine its code adding features, switching between encryption algorithms, shifting targets, and tweaking social engineering techniques to accelerate infection rates. To retrieve the APK, the dropper leverages the PackageInstaller class. This technique is employed to evade detection.

Banking 108
article thumbnail

News alert: Beazley reports on how AI, new tech distract businesses as cyber risk intensifies

The Last Watchdog

Bantick “As the MOVEit hack has proved, the bad actors are always looking for new ways to attack with tactics ranging from third party supplier attacks to more sophisticated social engineering and phishing attack techniques.

article thumbnail

Social Engineering – The Mental Game, Part I.

NopSec

The first thing that all organizations need to understand is why social engineering works. In its simplest form, social engineering is an attack that focuses on the human element in the security context. There are a few inherently human qualities that social engineers leverage as part of their attack.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

In fact, memory attacks have quietly emerged as a powerful and versatile new class of hacking technique that threat actors in the vanguard are utilizing to subvert conventional IT security systems. One tried-and-true incursion method pivots off social engineering. A network breach begins, of course, with an incursion.

Hacking 212