Scam of The Week: "Fake-tortion" Phishing Attacks
OK, this is a heads-up about a new aggressive form of email attack that you need to warn your employees, friends and family about. The bad guys have beta-tested and refined it in ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Founder and Executive Chairman
Invisible placeholder
OK, this is a heads-up about a new aggressive form of email attack that you need to warn your employees, friends and family about. The bad guys have beta-tested and refined it in ...
Brian Krebs wrote: "More than a week after it said most people would be eligible to enroll in a free year of its TrustedID identity theft monitoring service, big three consumer credit ...
Bleepingcomputer posted: "Reports are coming in from multiple security researchers and security firms about increased activity from one of the groups spreading the Locky ransomware. These ...
The September 2017 Webroot Quarterly Threat Trends Report showed that 1.385 million new, unique phishing sites are created each month, with a high of 2.3 million sites created in May. The ...
Cyber extortion is a very profitable criminal business model. Now, as if it was inevitable, someone has added a new, perverse twist: demanding naked photographs instead of Bitcoin, ...
You and I know that your users are the weak link, things like ID10T and PEBKAC come to mind. But do you know how bad the problem really is? Some people like to bury their head in the sand ...
Barracuda Advanced Technology Group says it’s tracking a ransomware threat that has so far spawned about 20 million phishing emails sent to unsuspecting users around the world in the last ...
The BBC has a cautionary tale for pretty much everyone who uses email. It’s the story of a finance director who was sacked after falling for a phishing scam disguised as a message from ...
Forbes wrote a great article about protecting your organization against ransomware. Despite all the funds spent on state-of-the-art security software, the bad guys are always just one ...
An undocumented Microsoft Office feature allows attackers to gather sensitive configuration details on targeted systems simply by sending a phishing email and social engineering victims ...
Cisco's TALOS security researchers discovered a devious way to infect millions of machines. They said: "Supply chain attacks are a very effective way to distribute malicious software into ...
There is an enormous amount of noise in the security space, so how do you know what people really talk about and think is the most important topic? Well, we created the Hackbusters site ...
A Vevo spokesperson told Gizmodo that the company “can confirm that Vevo experienced a data breach as a result of a phishing scam via Linkedin. We have addressed the issue and are ...
Security company Bromium put out a press release asking publicly: "Large Enterprises Spend Nearly $300K Per Year On Security Education, So Why Are Endpoint Attacks More Successful Than ...
WASHINGTON (Reuters) - The Trump administration on Wednesday told U.S. government agencies to remove Kaspersky Lab products from their networks, saying it was concerned the Moscow-based ...
I just found a very interesting blog post by Jerome Wendt, President & Lead Analyst of DCIG, Inc., an independent storage analyst and consulting firm.
Trend Micro researchers reported that cybercriminals spoofed the CEO email address the most, with CFOs and finance directors being the top attack targets. In their 2017 Midyear Security ...
CyberheistNews | KnowBe4
You already know that a 143 million Equifax records were compromised. The difference with this one is that a big-three credit bureau like Equifax tracks so much personal and sometimes ...