Microsoft Teams Phishing Attack Targets Office 365 Users

Up to 50,000 Office 365 users are being targeted by a phishing campaign that purports to notify them of a “missed chat” from Microsoft Teams. Continue reading Microsoft Teams Phishing Attack Targets Office 365 Users

Voter Registration ‘Error’ Phish Hits During U.S. Election Frenzy

Phishing emails tell recipients that their voter’s registration applications are incomplete – but instead steal their social security numbers, license data and more. Continue reading Voter Registration ‘Error’ Phish Hits During U.S. Election Frenzy

SBA Spoofed in COVID-19 Spam to Deliver Remcos RAT

As the ongoing COVID-19 pandemic impacts small businesses in the U.S., cybercriminals are trusting that people will be more likely to open unsolicited emails purporting to come from relevant entities.

The post SBA Spoofed in COVID-19 Spam to Deliver Remcos RAT appeared first on Security Intelligence.

Continue reading SBA Spoofed in COVID-19 Spam to Deliver Remcos RAT

State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends

Phishing has long been an infection vector of choice for threat actors, and for good reason — it is relatively easy, inexpensive and consistently successful.

The post State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends appeared first on Security Intelligence.

Continue reading State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends

How to Protect Your Employees When Threat Actors Leverage Legitimate Infrastructure

In a recent blog we discussed Why Organizations Need to Take Phishing Threats Against […]
The post How to Protect Your Employees When Threat Actors Leverage Legitimate Infrastructure appeared first on Security Boulevard.
Continue reading How to Protect Your Employees When Threat Actors Leverage Legitimate Infrastructure

How to Protect Your Employees When Threat Actors Leverage Legitimate Infrastructure

In a recent blog we discussed Why Organizations Need to Take Phishing Threats Against […]
The post How to Protect Your Employees When Threat Actors Leverage Legitimate Infrastructure appeared first on Security Boulevard.
Continue reading How to Protect Your Employees When Threat Actors Leverage Legitimate Infrastructure

How to Fight Back Against Macro Malware

Per X-Force IRIS, at least 22 percent of reported campaigns in April 2019 delivered macro malware. What methods can defenders leverage to help detect malicious macro activity?

The post How to Fight Back Against Macro Malware appeared first on Security Intelligence.

Continue reading How to Fight Back Against Macro Malware

How a Quirky Gmail Feature Led to a Phishing Scare and a Valuable Lesson in Email Security

What began as a moment of panic in the wake of what I thought was a phishing attempt ended up being a valuable lesson about a quirky Gmail feature and how it impacts the email security landscape.

The post How a Quirky Gmail Feature Led to a Phishing Scare and a Valuable Lesson in Email Security appeared first on Security Intelligence.

Continue reading How a Quirky Gmail Feature Led to a Phishing Scare and a Valuable Lesson in Email Security

Five High-Profile Watering Hole Attacks Highlight Importance of Network Security

Digital criminals use various techniques to breach organizations’ computer systems. One method that continues to be popular among cybercriminals is watering hole attacks. The name is derived from how predatory animals tend to lurk around watering… Continue reading Five High-Profile Watering Hole Attacks Highlight Importance of Network Security