Wanted: Disgruntled Employees to Deploy Ransomware

Criminal hackers will try almost anything to get inside a profitable enterprise and secure a million-dollar payday from a ransomware infection. Apparently now that includes emailing employees directly and asking them to unleash the malware inside their employer’s network in exchange for a percentage of any ransom amount paid by the victim company. Continue reading Wanted: Disgruntled Employees to Deploy Ransomware

What Every CISO Should Do to Fight Typosquat Attacks?

Attackers can use typosquatting domains to host a wide variety of scams. Typosquatting domains target vendors, customers and empoyees.
The post What Every CISO Should Do to Fight Typosquat Attacks? appeared first on Security Boulevard.
Continue reading What Every CISO Should Do to Fight Typosquat Attacks?

Hushpuppi Pleads Guilty: Sentence Estimate? 11-14 Years

On July 27, 2021, Ramon Olorunwa Abbas, also known as Hushpuppi, decided that his best plan would be to avoid spending the rest of his life in prison was to plead guilty.  I’ve actually never seen a plea agreement with so much redacting, but we c… Continue reading Hushpuppi Pleads Guilty: Sentence Estimate? 11-14 Years

Top Cyber Security Challenges Post Lockdown

By Sam Jones | Cyber Tec Security
Not too long ago things were looking bleak for the world, still under the dark cloud of the COVID pandemic, but with vaccine rollouts now taking place worldwide, there is finally a light at the end of the tun… Continue reading Top Cyber Security Challenges Post Lockdown

Malicious Office 365 Apps Are the Ultimate Insiders

Phishers targeting Microsoft Office 365 users increasingly are turning to specialized links that take users to their organization’s own email login page. After a user logs in, the link prompts them to install a malicious but innocuously-named app that gives the attacker persistent, password-free access to any of the user’s emails and files, both of which are then plundered to launch malware and phishing scams against others. Continue reading Malicious Office 365 Apps Are the Ultimate Insiders

Wall Street targeted by new Capital Call investment email scammers

Business Email Compromise (BEC) scammers, who have made rich returns in recent years tricking organisations into transferring funds into their accounts, have found a new tactic which attempts to swindle Wall Street firms out of significantly larger amo… Continue reading Wall Street targeted by new Capital Call investment email scammers

Apple’s Safe Browsing Request Proxy, BEC Attacks, LastPass Updates

In episode 161: Apple will start to proxy Safe Browsing requests to hide IP addresses from Google, the rise of Business Email Compromise attacks, and changes to the free version of LastPass. ** Links mentioned on the show ** Apple will proxy Safe Brows… Continue reading Apple’s Safe Browsing Request Proxy, BEC Attacks, LastPass Updates

Cyber Security Roundup for February 2021

A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, January 2021.
Throughout January further details about the scale and sophistication of SolarWinds suspe… Continue reading Cyber Security Roundup for February 2021