Apple Knocked Off Perch as Most Imitated Brand for Phishing Attacks

COVID-19 pandemic spurs spoofing preference changes, plus a surge in email-based attacks. Continue reading Apple Knocked Off Perch as Most Imitated Brand for Phishing Attacks

Vermont Taxpayers Warned of Data Leak Over the Past Three Years

A vulnerability in the state’s system may have exposed personal data that can be used for credential theft for those who filed Property Transfer Tax returns online. Continue reading Vermont Taxpayers Warned of Data Leak Over the Past Three Years

Diebold ATM Terminals Jackpotted Using Machine’s Own Software

The company warned that cybercriminals are using a black box with proprietary code in attacks to illegally dispense cash across Europe. Continue reading Diebold ATM Terminals Jackpotted Using Machine’s Own Software

CISA: Nation-State Attackers Likely to Exploit Palo Alto Networks Bug

An authentication-bypass vulnerability allows attackers to access network assets without credentials when SAML is enabled on certain firewalls and enterprise VPNs. Continue reading CISA: Nation-State Attackers Likely to Exploit Palo Alto Networks Bug

Office 365 Users Targeted By ‘Coronavirus Employee Training’ Phish

Threat actors shift focus from COVID-19 to employee coronavirus training and current events like Black Lives Matter as cyber-attacks continue to rise. Continue reading Office 365 Users Targeted By ‘Coronavirus Employee Training’ Phish

Analysis of the Top10 Hacktivist Operations

Key Points The most relevant hacktivist operations in the last 12 months were: #OpIceIsis, #OpChile, #OpChildSafety, #OpKillingBay and #OpBeast.  The operation #OpGeorgeFloyd, born after George Floyd was killed by police in Minneapolis in May 2020… Continue reading Analysis of the Top10 Hacktivist Operations