Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


U.S. Cyber Command Shares 11 New Malware Samples

Original release date: September 8, 2019

U.S. Cyber Command has released 11 malware samples to the malware aggregation tool and repository, VirusTotal. The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review U.S. Cyber Command’s VirusTotal page to view the samples. CISA also ...

Continue Reading →
0

Beware of Scammers Exploiting Recent Events

It seems that every new event brings out a crop of scammers ready to exploit the gullible.  Several recent scams are using the Equifax breach settlement, and the recent mass shootings in El Paso and Dayton to extract money from or deliver malware to their victims.

First, from KnowBe4, we have the details of several scams taking advantage of people attempting to get the $125 settlement payment they may be owed as a result of the Equifax ...

Continue Reading →
0

Lateral Phishing – A New Threat to Business Email

Phishing is getting better and harder to detect.  One new trend is using hijacked business email accounts to pivot further into a business, by using the built in trust of the company’s email domain to send phishing emails that appear to come from coworkers.  These phishing emails from trusted sources are used to hijack other email accounts in the same company.  This techniques ...

Continue Reading →
0

Don’t Get Emotional!

Social engineers have many tricks up their sleeves, and we have covered many of them in previous articles.  The biggest trick is phishing emails, of course, coupled with replica landing pages on hijacked websites.  Other methods include phone calls, such as fake tech support calls.  There are texting hoaxes, called smishing.  There are fake, cloned, or hijacked Facebook, LinkedIn, Twitter, and Instagram account ...

Continue Reading →
0

Guest Post – Evolution of Phishing: Spear Phishing and Whaling Scams Explained

Due to the high-profile cases of cybercrime in recent years, including the Facebook-Cambridge Analytica scandal back in 2018, the Equifax data breach in 2017, and the Russian interference with the US presidential election in 2016, cybersecurity is now a top priority for businesses, institutions, and individuals alike.

In order to implement effective countermeasures against cyber attacks, one has to have ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


The Spycraft Revolution

An very cool. detailed, and facinating look at how technology is changing and breaking the spy game from foreignpolicy.com.  Worth the read.

The world of espionage is facing tremendous technological, political, legal, social, and commercial changes. The winners will be those who break the old rules of the spy ...

Continue Reading →
0

New Phishing Scams Look So Real

There has been a stream of email alerts arriving at my inbox lately that warned of a variety of new phishing approaches that are using well-known brands (OneDrive and Office 365, FedEx and UPS), trusted sources (Department of Homeland Security, Gmail, Yahoo Mail), secure services (TLS certificates and HTTPS web sites) and curiosity (you received an encrypted message) to trick recipients into clicking a link that leads to a fake replica ...

Continue Reading →
0

Guest Post – Can You Trust Your Trusted Sources?

What follows is a sponsored post from cybersecurity firm Sequretek.

Businesses usually tend to trust their partners/ technology partners when related to the security of the data flowing across partners. This approach has changed drastically these days; now businesses themselves need to focus on their cyber security measures. There is a sudden rise in the number of supply chain attacks, by which we can conclude that attackers are easily spotting out vulnerabilities in the supply chain network of the organisations. Today, ...

Continue Reading →
0
Page 1 of 10 12345...»