Phishing Campaign with Blurred Images
For a few days, I’m seeing a lot of phishing emails that try to steal credentials from victims. Well, nothing brand new but, this time, the scenario is quite different :Read More →
Cyber Security Incident News | Infosec Blog | Information Security Tutorials
For a few days, I’m seeing a lot of phishing emails that try to steal credentials from victims. Well, nothing brand new but, this time, the scenario is quite different :Read More →
The domain name’s new owners want $2.5 million to give it back. In common with many other vendors, TP-Link, one of the world’s biggest sellers of Wi-Fi access points and homeRead More →
ESET analyzes multiple samples targeting OS X every day. Those samples are usually potentially unwanted applications that inject advertisements into browser displays while the victim is browsing the web. For theRead More →
The security researcher from Government Lab Mohammed Adel has found a vulnerability in the UK Defence Gateway that exposes army data. The security researcher from Government Lab Mohammed Adel has foundRead More →
A second US man has pleaded guilty to stealing intimate pictures of celebrities using a phishing scam. Edward Majerczyk, 28, who resides in Chicago and Orland Park, Illinois, was chargedRead More →
Talos have observed a large uptick in the Zepto ransomware and have identified a method of distribution for the Zepto ransomware, Spam Email. Locky/Zepto continue to be well known ransomwareRead More →
It all started from a spam campaign. Figure 1 shows a campaign we picked up recently from our spam traps with a suspicious document file attachment. Notice how poor theRead More →
The Federal Investigation Agency in Pakistan is investigating a Chinese organization that is specialized in attacking ATM machines by using skimmer devices. A few days ago I reported the storyRead More →
Threat actors are known to switch targeted geographies from time to time, and it appears that a number have set their sights on Canada within a short time-frame. In theRead More →
Company also doesn’t support encryption backdoors. Via a statement from Steve Grobman, Chief Technology Officer for Intel Security, Intel has denied claims made by hardware security expert Damien Zammit, who detailedRead More →