article thumbnail

Staying a Step Ahead of the Hack

Webroot

Hackers, never at a loss for creative deception, have engineered new tactics for exploiting the weakest links in the cybersecurity chain: ourselves! Social engineering and business email compromise (BEC) are two related cyberattack vectors that rely on human error to bypass the technology defenses businesses deploy to deter malware.

Hacking 47
article thumbnail

Office 365 phishing campaign uses redirector URLs and detects sandboxes to evade detection

Security Affairs

“We’re tracking an active credential phishing attack targeting enterprises that uses multiple sophisticated methods for defense evasion and social engineering,” reads a message published by Microsoft via Twitter. pic.twitter.com/YpUVEfmlUH — Microsoft Security Intelligence (@MsftSecIntel) November 16, 2020.

Phishing 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A week in security (June 28 – June 4)

Malwarebytes

Researchers explore the insecure world of the subdomain (Source: Can i take your subdomain) Cyber insurance model is broken, consider banning ransomware payments (Source: The Register) How facial recognition solutions can safeguard the hybrid workplace (Source: Help Net Security) Capital One hacker faces fresh charges for 2019 hacking spree (Source: (..)

article thumbnail

A week in security (August 9 – August 15)

Malwarebytes

Other cybersecurity news: Activist raided by police over ‘confidential’ meeting notes (Source: The Register) Hacker claims to have data on more than 100 million T-Mobile customers, asks for $277,000 (Source: Gizmodo) Warzone hackers and cheaters make season 5 the worst update ever (Source: GamingIntel) In a first for Maine, ransomware hackers hit 2 (..)

article thumbnail

Crooks spread malware via pirated movies during COVID-19 outbreak

Security Affairs

— Microsoft Security Intelligence (@MsftSecIntel) April 28, 2020. ” reads the Tweet published by the Microsoft Security Intelligence team. . ” reads the Tweet published by the Microsoft Security Intelligence team. — Microsoft Security Intelligence (@MsftSecIntel) April 28, 2020.

Malware 85
article thumbnail

7 Insights About Managing Cyber Risk You Can’t Afford To Miss

Jane Frankland

Whilst this is concerning, when talking to executives outside of security, like I did on a recent masterclass with Nowcomm , it’s vital they understand of the following: 1. These days, hacking as a service is cheap. Security intelligence comes with a high pay off. All attacks are not sophisticated. million.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Social engineering attacks , including phishing, spam, and viruses introduced via clickable links within e-mail affected 80% of the banking institutions in 2016. Aimed at reducing corporate vulnerability to insider threats, info security professionals should regularly monitor the most important infrastructure locations.