Category

Phishing Prevention

Phishing Prevention prevents from phishing attacks, Phishing scams, phishing sites. Phishing attacks have now progressed toward becoming something of a day by day event for some.

Mobile Phishing Campaign
The campaign, labeled “Soula”, collects information via a spoofed login screen of one of the country’s leading search engines that pops up over the original webpage.   It sends the logged credentials to the attackers’ server even without accurate data confirmation, leading researchers to think that the cybercriminals are at research and information-gathering stage.  ...
Continue Reading
Mac Malware Utilized by Hacking Group APT32 to Attack Servers
A newly identified MacOS backdoor detected by AV companies as OSX_OCEANLOTUS.D that is perceived as the latest version of a threat used by OceanLotus (a.k.a. APT 32, APT-C-00, SeaLotus, and Cobalt Kitty).   OceanLotus was responsible for launching targeted attacks against human rights organizations, media organizations, research institutes, and maritime construction firms. The attackers behind...
Continue Reading
phishing sites
Summary HTTPS green padlock symbol may no longer indicate secured connection. Analysis There has been a steady increase in threat actors’ use of SSL certificates to add an air of legitimacy to malicious websites. Since 2017 almost a third of phishing sites had SSL certificates, meaning their URLs began with HTTPS:// and (most) browsers displayed...
Continue Reading
Phishing Scheme
Baiting Scheme Legitimately looking organization newsletter subscription forms to scam unwary victims from making payment transactions leading to hackers’ personal bank account. Phishing Technique Drawn companies such as Audi, Austrian Airlines, and S-Bahn Berlin to Russian users. Here’s how it is pulled off: Email catch line saying “Money for you” either written in English or...
Continue Reading
PDF attacks
Email users are mindful on how attackers used phishing and spear-phishing campaigns and how this medium is being the source of these attacks as with most email attachments or links, PDF files have gotten a lot of attention from threat actors.   Code Execution   Our familiarity with the possibility of malicious Office attachments that...
Continue Reading
Office 365 phishing scam
Phishing attacks have now progressed toward becoming something of a day by day event for some. However, the motivation behind why these noxious attacks stay abundant lies in their resourcefulness. In time, we know about a clever phishing method that includes technical support as well. We are talking about an Office 365 phishing campaign that...
Continue Reading
phishing Attacks
Another phishing campaign called ” Beyond the Grave” targeted international hedge funds on January 9th, 2019. In an announcement presented on Bleeping Computer, the attackers have expressed that they will keep on targeting banking and financial institutions in the future. A part named Xander Bauer has made a post in the Bleeping Computer forums with...
Continue Reading
Healthcare industry
Health First just uncovered an information rupture that influenced its online application seller. It may have traded off the individual information of around 42,000 clients. The firm guaranteed that the information broke incorporated clients’ Social Security Numbers, locations and dates of birth.   In any case, the social insurance association asserts that no therapeutic data...
Continue Reading
DarkHotel
The stealthy North Korean APT group dubbed DarkHotel, otherwise known as APT-C-06, Fallout Team, SIG25, and so on, has been progressively focusing on Internet Explorer (IE) scripting motor. Security specialists as of late found that DarkHotel made new endeavors for two more seasoned vulnerabilities influencing the Internet Explorer scripting motors.   Despite the fact that...
Continue Reading
Malware Attack protection on The Pakistani Military
The Pakistan Air Force is the evident focus of a complex new state-supported assault campaign. Security house Cylance said for this present week a state-supported gathering – named the White Company by scientists – has been hoping to get into the systems of the Pakistani military in a long haul focused on assault battle known...
Continue Reading
1 2 3 5