An American e-commerce firm and leading designer and manufacturer of clothing items, Next Level Apparel, has recently experienced a data breach issue that affected its employees’ email accounts. As reported by the firm’s issued press release, a small number of employee email accounts have been compromised to an email phishing incident. The attack has given threat actors unauthorized access to sensitive company information. The exposed...Continue Reading
Microsoft reported a newly found Phishing-as-a-Service operation last Tuesday, which has used a high-volume 300,000 distinct and newly created subdomains that are operated in a single run. According to the tech giant, they discovered the campaign amid their research about phishing attacks triggered by the phishing-as-a-service operation named BulletProofLink. The procedure is reported to be offering low-cost domain hosting,...Continue Reading
Researchers have found that a spam campaign has revised its methods to add an extensive commodity remote access trojans or RATs and geolocation filtering to evade being detected by authorities. The said spam campaign focuses on distributing spear-phishing emails towards South American organizations. According to security researchers, the attacks were attributed to an advanced persistent threat or...Continue Reading
Within two days of the phishing campaign, the US Department of Transportation or USDOT has been imitated by cyber-attackers. They operated on combined tactics such as forming new domains to copy and mimic federal sites to appear authentic and avoid being detected by authorities. Security researchers have identified at least 41 phishing emails between August 16 to...Continue Reading
Recent reports reveal that about a third of emails that employees have been reporting to be malicious are indeed threats of phishing attacks. From the analysis of IT security companies, it was found that at least 33% of more than 200,000 flagged emails by employees from different firms worldwide for the first half of 2021...Continue Reading
Several cyber threats have recently emerged involving the COVID-19 pandemic theme, even from the initial stages worldwide up to as new variants such as the Delta spreads today. One example of this is a threat group called TA542 that is mainly prevalent with their distribution of the Emotet malware. This threat group started to use COVID-19 related email threats last...Continue Reading
As reported this week by the Slovak security firms ESET and IstroSec, a group of Russian cyber espionage spies associated with the country’s intelligence services has been targeting and attacking the Slovak government for many months already. Cybersecurity agencies from the US and some other countries have linked the attacks from Dukes, Nobelium, or...Continue Reading
It is a usual scenario where our passwords are required to be changed at times of data breach. Still, the truth is that cybercriminals take advantage of this situation by harvesting all the vulnerable target information before victims actually become aware of what’s happening. Learn more about how the data breaching process happens here. Passwords have undeniably become the source of protection and authentication for...Continue Reading
The health insurance industry in the US is now facing an increased risk of cyber threat attacks due to the rise of sophisticated exploitative techniques being used and developed by cybercriminals and fraudsters. This is due to the expansion of industries towards online digitization in conducting transactions, billing, and client records. Health insurers or related...Continue Reading
The number of cyberattacks against ICS SCADA (Industrial Control Systems Supervisory Control and Data Acquisition) system products used by industrial organizations worldwide has rapidly increased. Hence, many cybersecurity firms and whitehat hackers highlighted the risks of attack that target OT (Operational Technology) network used in utilities. Among the most significant cyber-attack against industrial organizations...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.