Tag

phishing attack

phishing attack page 1

ta5050 phishing campaign malware antimalware financial organizations

A threat actor known as TA505 recently launched a phishing campaign that uses living-of-the-land binaries (LOLBins) to distribute a new backdoor malware

Threat Summary Malicious actor TA505 known for these notorious campaigns namely info stealer malware Dridex, the Locky ransomware, and more. Another attack carried out by the same group on multiple continents, including North America, Asia, Africa, and South America. Primarily focusing on large financial organizations, this group at the same time perform well-planned, advanced attacks...
Continue Reading
phising email phishing anti phishing phishing solutions databreach data breach

Popular Fitness Program Suffers Security Breach

The world-renowned fitness platform – Bodybuilding.com has suffered a data breach in which personal data of registered users has been accessed. The breach was identified in February 2019 and after conducting an investigation it was revealed that it was a result of a phishing attack carried out in July 2018. Although the exact number of...
Continue Reading
Phishing Modus Using WhatsApp

Phishing Modus Using WhatsApp: An alternative to Email Campaigns

What is up with the app? Cybercriminals who take advantage of people through social engineering techniques are now prowling within WhatsApp. Noticeably these threat actors are largely targeting Middle Eastern countries using company logos, and preset messages to lure victims in giving out crucial information. What are the styles of messages? From fake lottery winners...
Continue Reading
Phishing Attack

Phishing Attack Impersonates Law Firm and Microsoft

The most common phishing attacks can often be quite convincing, but some more technologically-aligned users recognize something isn’t right when they see that the login form is unsecured or the SSL certificate doesn’t match the company being impersonated. Nevertheless, there is a new phishing attack that stores their phishing form on Azure Blob Storage, so...
Continue Reading
Hackers Prefer Tuesdays When Deploying Phishing Attacks

Hackers Prefer Tuesdays When Deploying Phishing Attacks

Malicious cyber attackers steal user credentials by tricking unsuspecting users into using their login information on engineered fake websites. By hijacking an existing login page or creating an accurately similar login website that you can’t tell it apart from the authentic site, attackers easily gain access to the target network. Organized phishing operations, in which...
Continue Reading
Phishing Prevention

Phishing via Misspelling

Phishing via Misspelling Phishing, no matter what form it takes is now considered to be the #1 security threat affecting users and their devices. While most phishing techniques have remained a stable cyber-attack over the years, affecting users on computers for as long as the internet has been around, hackers have learned to take advantage...
Continue Reading
Cheating Winner Malware Winner

Cheating Winner Malware Winner

Cheating Winner Malware Winner Is there by any chance that you like to play multiplayer competitive games online, like Fortnite and PUBG? Then most players who are competitive in skills and spirit encounter overeager players who are taking advantage of glitches and cheats provided by 3rd party unauthorized programs. This trend has been going on...
Continue Reading
Android Triple Threat

Triple Cyber Threat Approach Android

Phishing attacks in the cyber world is relentless as ever, because of new vulnerabilities with the evolution of technology. We can’t deny that these threats exist, because victims are gaining in numbers and falling prey to Android Banking Malware which is being used for phishing activities. It is not a surprise that techniques are combined...
Continue Reading
Personalized Phishing

Personalized Phishing

Sophisticated Spear Phishing: Customized Phishing Attacks Our  Phishing Intelligence team noticed that sophisticated phishing attacks are more likely to occur these days targeting corporate employees and their contacts in their email addresses. This is commonly known as Spear Phishing is needed. Basically this type of phishing attack is devised by doing a thorough research on specific targets,...
Continue Reading
Phish Beneath IOS Environment, anti-phishing solution

Phish Under The IOS Environment

Surprised? A Phishing modus designed to take your Apple ID password from you. A lot of people still claims that the iOS is Malware proof and/or is attack proof that is what majority of the people know since most users just want the simplicity of using their phones from their pockets. Advertisements and the media are...
Continue Reading
1 2