Latest Multi-Stage Attack Scenarios with Real-World Examples

November 27, 2024 at 08:03AM Multi-stage cyber attacks involve complex tactics, such as embedding malicious links in documents and using QR codes, to evade detection. Current methods include multi-stage redirects and email attachments, often leading to phishing pages. Tools like ANY.RUN’s sandbox can analyze these threats, providing insights to strengthen defense strategies against such attacks. … Read more

Webinar: Learn How Storytelling Can Make Cybersecurity Training Fun and Effective

November 8, 2024 at 05:39AM Huntress Managed Security Awareness Training (SAT) transforms traditional cybersecurity training through storytelling, making complex concepts engaging and memorable. In an upcoming webinar, experts will discuss the effectiveness of storytelling, the benefits of a managed solution, and innovative tools to enhance user engagement. Join to revolutionize your security training culture. **Meeting … Read more

New Grandoreiro Banking Malware Variants Emerge with Advanced Tactics to Evade Detection

October 23, 2024 at 02:00PM New variants of Grandoreiro banking malware are evolving to evade anti-fraud measures, employing tactics like domain generation algorithms and mouse tracking. Despite some arrests, operators continue to develop new features and target users across 45 countries, primarily through phishing. The malware adapts continuously, posing a significant threat to banking security. … Read more

Microsoft creates fake Azure tenants to pull phishers into honeypots

October 19, 2024 at 10:41AM Microsoft is employing deceptive strategies against phishing by using realistic honeypot tenants to attract cybercriminals. This approach enables the collection of intelligence on attackers’ methods, facilitating infrastructure mapping, campaign disruption, and prolonged deception. Presented by Ross Bevington at BSides Exeter, it aims to enhance security and understanding of threat actors. … Read more

Say Goodbye to Phishing: Must-Haves to Eliminate Credential Theft

September 13, 2024 at 08:15AM Despite increasing cyber threats, phished credentials remain the primary access vector for unauthorized entry, constituting over 80% of corporate risk. Traditional defenses are inadequate, prompting Beyond Identity to provide deterministic defenses by eliminating phishing, password usage, and push bombing attacks. Their platform authenticator also integrates diverse risk signals for adaptive … Read more

Google now blocks spoofed emails for better phishing protection

April 1, 2024 at 04:34PM Google has implemented stricter guidelines for bulk email senders, requiring email authentication and adherence to specific spam thresholds. Non-compliance may lead to email delivery issues and rejection of non-compliant traffic starting in April 2024. These measures aim to prevent spam, phishing, and malware, ensuring users can rely on the security … Read more

Ongoing Microsoft Azure account hijacking campaign targets executives

February 12, 2024 at 02:17PM A recent phishing campaign targeting Microsoft Azure has compromised hundreds of user accounts, including those of senior executives. The hackers aim to access confidential information and launch more attacks within the breached organization. Proofpoint has issued an alert with details of the attacks and defense measures, including monitoring user-agent strings … Read more

Hacking the Human Mind: Exploiting Vulnerabilities in the ‘First Line of Cyber Defense’

December 7, 2023 at 07:00AM Cybersecurity attackers exploit human qualities like trust and emotions through social engineering to compromise personal and organizational security. Recognizing these vulnerabilities enables better defense strategies. These concepts stem from Ulrich Swart’s article in the Security Navigator, which also explores hacktivism and cyber extortion research. **Meeting Takeaways:** 1. **Human Complexities in … Read more