Category

Phishing

Phishing Page 1

Ecommerce firm Next Level Apparel email phishing

E-commerce firm, Next Level Apparel suffered email phishing that affects some employees

An American e-commerce firm and leading designer and manufacturer of clothing items, Next Level Apparel, has recently experienced a data breach issue that affected its employees’ email accounts. As reported by the firm’s issued press release, a small number of employee email accounts have been compromised to an email phishing incident. The attack has given threat actors unauthorized access to sensitive company information.  The exposed...
Continue Reading
300k Subdomains exploited Phishing-as-a-Service Scam phishing attack

300,000 Subdomains gets exploited by a newly discovered Phishing-as-a-Service Scam

Microsoft reported a newly found Phishing-as-a-Service operation last Tuesday, which has used a high-volume 300,000 distinct and newly created subdomains that are operated in a single run. According to the tech giant, they discovered the campaign amid their research about phishing attacks triggered by the phishing-as-a-service operation named BulletProofLink. The procedure is reported to be offering low-cost domain hosting,...
Continue Reading
Spam campaign attacks new techniques South American organizations

Spam campaign attacks revise its techniques against South American organizations

Researchers have found that a spam campaign has revised its methods to add an extensive commodity remote access trojans or RATs and geolocation filtering to evade being detected by authorities. The said spam campaign focuses on distributing spear-phishing emails towards South American organizations.  According to security researchers, the attacks were attributed to an advanced persistent threat or...
Continue Reading
USDOT website impersonation email phishing online scam

USDOT has been impersonated to conduct a two-day email phishing scam

Within two days of the phishing campaign, the US Department of Transportation or USDOT has been imitated by cyber-attackers. They operated on combined tactics such as forming new domains to copy and mimic federal sites to appear authentic and avoid being detected by authorities.  Security researchers have identified at least 41 phishing emails between August 16 to...
Continue Reading
Evidence suspicious emails phishing attack threats vishing SMiShing

Evidence proves that one out of three flagged suspicious emails were actual phishing attack threats

Recent reports reveal that about a third of emails that employees have been reporting to be malicious are indeed threats of phishing attacks. From the analysis of IT security companies, it was found that at least 33% of more than 200,000 flagged emails by employees from different firms worldwide for the first half of 2021...
Continue Reading
COVID-19 themes email cyber attacks phishing malware image 3

COVID-19 themes leveraged for email cyberattacks have recently surged following the spread of the Delta variant

Several cyber threats have recently emerged involving the COVID-19 pandemic theme, even from the initial stages worldwide up to as new variants such as the Delta spreads today. One example of this is a threat group called TA542 that is mainly prevalent with their distribution of the Emotet malware. This threat group started to use COVID-19 related email threats last...
Continue Reading
russian cyber espionage slovak government spear phishing malware

A group of Russian cyber espionage targets the Slovak government

As reported this week by the Slovak security firms ESET and IstroSec, a group of Russian cyber espionage spies associated with the country’s intelligence services has been targeting and attacking the Slovak government for many months already.   Cybersecurity agencies from the US and some other countries have linked the attacks from Dukes, Nobelium, or...
Continue Reading
Fraudsters user passwords data breach online phishing

Fraudsters harvest user passwords via data breach and online phishing

It is a usual scenario where our passwords are required to be changed at times of data breach. Still, the truth is that cybercriminals take advantage of this situation by harvesting all the vulnerable target information before victims actually become aware of what’s happening. Learn more about how the data breaching process happens here.   Passwords have undeniably become the source of protection and authentication for...
Continue Reading
cyber threat attacks customer data theft US Health Insurance Industry 

Increasing risk of customer data theft on US Health Insurance industry 

The health insurance industry in the US is now facing an increased risk of cyber threat attacks due to the rise of sophisticated exploitative techniques being used and developed by cybercriminals and fraudsters. This is due to the expansion of industries towards online digitization in conducting transactions, billing, and client records.  Health insurers or related...
Continue Reading
whitehat hackers breach network north america utility ICS SCADA

Whitehat hackers successfully breached the network of North American utility

The number of cyberattacks against ICS SCADA (Industrial Control Systems Supervisory Control and Data Acquisition) system products used by industrial organizations worldwide has rapidly increased. Hence, many cybersecurity firms and whitehat hackers highlighted the risks of attack that target OT (Operational Technology) network used in utilities.   Among the most significant cyber-attack against industrial organizations...
Continue Reading
1 2 3 22