Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.

The post Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks appeared first on Security Intelligence.

Continue reading Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.

The post Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks appeared first on Security Intelligence.

Continue reading Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

Gmail for iOS Adds Anti-Phishing Feature that Warns of Suspicious Links

Phishing — is an older style of cyber-attack but remains one of the most common and efficient attack vectors for attackers, as a majority of banking malware and various ransomware attacks begin with a user clicking on a malicious link or opening a dangerous attachment in an email.

Phishing has evolved than ever before in the past few years – which is why it remains one of those threats that

Continue reading Gmail for iOS Adds Anti-Phishing Feature that Warns of Suspicious Links

Hackers Hijacked Chrome Extension for Web Developers With Over 1 Million Users

From past few years, spammers and cyber criminals were buying web extensions from their developers and then updating them without informing their users to inject bulk advertisements into every website user visits in order to generate large revenue.

But now they have shifted their business model—instead of investing, spammers have started a new wave of phishing attacks aimed at hijacking

Continue reading Hackers Hijacked Chrome Extension for Web Developers With Over 1 Million Users

Someone Hijacks A Popular Chrome Extension to Push Malware

Phishers have recently hacked an extension for Google Chrome after compromising the Chrome Web Store account of German developer team a9t9 software and abused to distribute spam messages to unsuspecting users.

Dubbed Copyfish, the extension allows use… Continue reading Someone Hijacks A Popular Chrome Extension to Push Malware

Two New Platforms Found Offering Cybercrime-as-a-Service to ‘Wannabe Hackers’

Cybercrime has continued to evolve and today exists in a highly organised form.

Cybercrime has increasingly been commercialised, and itself become big business by renting out an expanded range of hacking tools and technologies, from exploit kits to ra… Continue reading Two New Platforms Found Offering Cybercrime-as-a-Service to ‘Wannabe Hackers’

Energy, Nuclear Targeted with Template Injection Attacks

Adversaries are using the SMB communications channel to launch template injection attacks against the energy sector, including nuclear facilities. Continue reading Energy, Nuclear Targeted with Template Injection Attacks

Russian Hackers Made ‘Tainted Leaks’ a Thing — Phishing to Propaganda

We came across so many revelations of sensitive government and corporate data on the Internet these days, but what’s the accuracy of that information leaked by unknown actors?

Security researchers have discovered new evidence of one such sophisticated… Continue reading Russian Hackers Made ‘Tainted Leaks’ a Thing — Phishing to Propaganda

Rash Of Phishing Attacks Use HTTPS To Con Victims

Phishing sites are deploying freely available TLS certificates in order to dupe victims into thinking they’re visiting a safe site. Continue reading Rash Of Phishing Attacks Use HTTPS To Con Victims