Hacker Who Leaked Celebrities’ Naked Photos Gets 8 Months in Prison

George Garofano (left)

The fourth celebrity hacker—who was charged earlier this year with hacking into over 250 Apple iCloud accounts belonged to Jennifer Lawrence and other Hollywood celebrities—has been sentenced to eight months in prison.

Earlier… Continue reading Hacker Who Leaked Celebrities’ Naked Photos Gets 8 Months in Prison

Microsoft Detects More Russian Cyber Attacks Ahead of Mid-Term Election

Microsoft claims to have uncovered another new Russian hacking attempts targeting United States’ Senate and conservative think tanks ahead of the 2018 midterm elections.

The tech giant said Tuesday that the APT28 hacking group—also known as Strontium,… Continue reading Microsoft Detects More Russian Cyber Attacks Ahead of Mid-Term Election

Email Phishers Using New Way to Bypass Microsoft Office 365 Protections

Phishing works no matter how hard a company tries to protect its customers or employees.

Security researchers have been warning of a new phishing attack that cybercriminals and email scammers are using in the wild to bypass the Advanced Threat Protect… Continue reading Email Phishers Using New Way to Bypass Microsoft Office 365 Protections

Microsoft Says Russia Tried to Hack Three 2018 Midterm Election Candidates

Microsoft said it detected and helped the US government to block Russian hacking attempts against at least three congressional candidates this year, a Microsoft executive revealed speaking at the Aspen Security Forum today.

Although the company refuse… Continue reading Microsoft Says Russia Tried to Hack Three 2018 Midterm Election Candidates

ZeroFont Phishing Attack Bypasses Office 365 Security

A new dangerous hacker tactic has been identified as the ZeroFont phishing attack which is responsible for infections caused by Office 365 manipulation. This is done by using social engineering tactics that manipulate the users into interacting with at… Continue reading ZeroFont Phishing Attack Bypasses Office 365 Security

How to Recognize a Business Email Compromise Attack

Security leaders must implement phishing awareness programs to train employees to recognize business email compromise (BEC) attacks and other social engineering schemes that could compromise data.

The post How to Recognize a Business Email Compromise Attack appeared first on Security Intelligence.

Continue reading How to Recognize a Business Email Compromise Attack

Android Trojan Allows Hackers to Steal $8,000 Per Day from Russian Banks

Law enforcement in Moscow, with support from Group-IB, recently arrested a 32-year-old hacker, accused of taking part in stealing funds from customers of Russian banks using Android Trojans. At the height of their activity, the attackers reportedly sip… Continue reading Android Trojan Allows Hackers to Steal $8,000 Per Day from Russian Banks