How to Protect Against Deepfake Attacks and Extortion

Cybersecurity professionals are already losing sleep over data breaches and how to best protect their employers from attacks. Now they have another nightmare to stress over — how to spot a deepfake.  Deepfakes are different because attackers can easily use data and images as a weapon. And those using deepfake technology can be someone from […]

The post How to Protect Against Deepfake Attacks and Extortion appeared first on Security Intelligence.

Continue reading How to Protect Against Deepfake Attacks and Extortion

Cyberattacks Use Office 365 to Target Supply Chain

Malicious actors have a history of trying to compromise users’ Office 365 accounts. By doing so, they can tunnel into a network and use their access to steal sensitive information. But they need not stop there. They can also single out other entities with which the target does business for supply chain cyberattacks. Office-Related Cyberattacks […]

The post Cyberattacks Use Office 365 to Target Supply Chain appeared first on Security Intelligence.

Continue reading Cyberattacks Use Office 365 to Target Supply Chain

How to Avoid Smishing Attacks Targeting Subscription Service Users

If you’re anything like me, you used delivery more during the pandemic than before. Both getting food brought to my door and meal kit boxes mean people don’t have to mask up and go out to the grocery store. But threat actors know that, too. Recent scams take advantage of people signing up for more […]

The post How to Avoid Smishing Attacks Targeting Subscription Service Users appeared first on Security Intelligence.

Continue reading How to Avoid Smishing Attacks Targeting Subscription Service Users

How to Prepare for a Cyberattack

Preventing cyberattacks isn’t easy. If it were, there wouldn’t be a continuous stream of ransomware attacks dominating news feeds, nor would the president of the United States feel compelled to issue executive orders on cybersecurity or to declare tha… Continue reading How to Prepare for a Cyberattack

Cryptomining Scam Apps, ‘Stealer’ Trojans Culled from Google Play

There’s a whole lot going on over at the Google Play store. First, Lookout researchers found 170 apps used in cryptomining scams that have snared more than 93,000 victims. Actually, only 25 were available for download on Google Play; the vast majority… Continue reading Cryptomining Scam Apps, ‘Stealer’ Trojans Culled from Google Play

Why a Phishing Attack Is Still Profitable — And How To Stop One

As the business world continues to grapple with an expanding definition of new normal, the phishing attack remains a common tactic for attackers. Why are phishing attacks still happening? How can we prevent them? We spoke to a threat analyst who has the answers. In May 2020, X-Force research uncovered a precision-targeting (or spear phishing) […]

The post Why a Phishing Attack Is Still Profitable — And How To Stop One appeared first on Security Intelligence.

Continue reading Why a Phishing Attack Is Still Profitable — And How To Stop One

Educating the Educators: Protecting Student Data

I found my 17-year-old son happily playing video games last year when he was supposed to be in virtual school. But after a few questions, I learned he wasn’t skipping school. His class had been canceled after his teacher fell for a phishing attack, and their computer was infected with a virus. This isn’t an […]

The post Educating the Educators: Protecting Student Data appeared first on Security Intelligence.

Continue reading Educating the Educators: Protecting Student Data

Hackers Launch Cyberattack via U.S. Aid Agency Email Accounts

Microsoft announced a Russian threat group (ITG05, aka Nobellium, APT28) also thought to be behind the SolarWinds attack conducted an email campaign masquerading as the U.S. Agency for International Development. Microsoft reports that while organizations in the United States received the largest share of attacks, targeted victims span at least 24 countries. The earlier campaign […]

The post Hackers Launch Cyberattack via U.S. Aid Agency Email Accounts appeared first on Security Intelligence.

Continue reading Hackers Launch Cyberattack via U.S. Aid Agency Email Accounts

China’s Cybercriminals Profit From Underground Data Monetization

Cybercriminals are using big data technology to make money from data obtained on the Chinese-language underground. Quelle surprise. An analysis of open source information and data drawn from a variety of closed forums showed a cycle that included mult… Continue reading China’s Cybercriminals Profit From Underground Data Monetization

An Update: The COVID-19 Vaccine’s Global Cold Chain Continues to Be a Target

In December 2020, IBM Security X-Force released a research blog disclosing that the COVID-19 cold chain — an integral part of delivering and storing COVID-19 vaccines at safe temperatures — was targeted by cyber adversaries. After that first report, we recently discovered an additional 50 files tied to spear-phishing emails that targeted 44 companies in […]

The post An Update: The COVID-19 Vaccine’s Global Cold Chain Continues to Be a Target appeared first on Security Intelligence.

Continue reading An Update: The COVID-19 Vaccine’s Global Cold Chain Continues to Be a Target