Cyber Security

[Scam Of The Week] New Sextortion Attacks Take A Dark Turn

By |2018-12-12T09:55:56-06:00December 15th, 2018|Categories: Security, Cyber Security|Tags: , , , , , , , , , , , , , , , , , , |

New Sextortion Attacks Take A Dark Turn And Infect People With GandCrab Ransomware A recent report shows that last week, employees in the U.S have been bombarded by a spam attack! This attack pushes a double-whammy of a sextortion attempts combined with ransomware! Starting around May 2018, there have been a number of attack waves [...]

Ransomware Bundle Makes Malware Attacks Easier for Crooks

By |2018-11-28T12:51:06-06:00November 1st, 2018|Categories: Cyber Security|Tags: , , , , , , , , , , |

  A recent report found that ransomware bundles are being sold over the dark web for a pretty hefty, but still very addordable price (around $750). These bundles offer 2018's most notorious and devestatingly damaging forms of ransomware strains, including SamSam, Magnibar, Satan, CryBrazil, and more! Cybersecurity researchers from top cybersecurity firms, have discovered the rasompack [...]

Password Sharing is not Caring

By |2018-10-09T12:00:22-05:00October 1st, 2018|Categories: Cyber Security|Tags: , , , , , , , , , , , , , , |

Cybercriminals thrive on misuse of credentials, and users sharing them only makes the criminal’s job easier.  According to a recent report, password sharing is running rampant. The password has been the long-standing guardian keeping unauthorized users from accessing data, applications, and systems they shouldn’t. But, the password is only powerful when the assigned user keeps it private. [...]

Phishing Attack Uses Decoy PDF with Microsoft-issued SSL Cert

By |2018-10-08T16:34:13-05:00September 15th, 2018|Categories: phishing, Cyber Security|Tags: , , , , , , , , , , , , , |

A recent phishing attack posing as a PDF decoy from a Denver law firm was stealing clients' Office 365 credentials. The phishing bait was hosted in Azure blob storage and contained a Microsoft-issued domain and SSL certificate, making it particularly believable. Since the phishing bait was hosted in Azure blob storage, it had a Microsoft-issued [...]

One in Five Employees Share Their Email Password!

By |2018-09-04T08:57:18-05:00September 1st, 2018|Categories: Cyber Security|Tags: , , , , , , , , , , , , , |

Negligent employees remain the number one cause of data breaches at small businesses across America. So why do small businesses continue to struggle with good cyber security practices and what can they do to correct those habits? Small to medium-sized businesses are hit with nearly 4,000 cyber attacks per day -- and that number is [...]

SharePoint Phishing Attack Impacts 10% of Office 365 Users

By |2018-08-17T10:58:35-05:00August 15th, 2018|Categories: phishing, Cyber Security|Tags: , , , , , , , , , , , , , , , , |

The attack dubbed “PhishPoint” demonstrates the craftiness and extent cybercriminals will go to in order to harvest Office 365 credentials.   This latest attack uses several familiar aspects of Office 365 to lull potential victims into an assumption everything is above board.   Here’s how the PhishPoint attack works: The user receives the malicious email –There [...]

Second Quarter 2018 Top-Clicked Phishing Email Subjects

By |2018-07-25T11:23:13-05:00August 1st, 2018|Categories: Cyber Security|Tags: , , , , , , , , , , , , , , , , , |

We've been reporting on the top-clicked phishing email subjects every quarter for a while now across three different categories: general emails, those related to social media, and 'in the wild' attacks that are a result of millions of users clicking on the Phish Alert Button on real phishing emails and allowing our team to analyze the results. [...]

New Deceptive Strains of Payroll Phishing: “Because that’s where the money is…”

By |2018-07-25T10:22:17-05:00July 15th, 2018|Categories: Cyber Security|Tags: , , , , , , , , , , , , , , |

Most readers will probably be familiar with the mythical story of bank robber Willie Sutton who, after being nailed by the cops, was asked why he robbed the bank. His answer (undoubtedly delivered in the most deadpan voice one can imagine): "Because that's where the money is." Although criminals have gone high tech since the [...]

It Saves Your Battery, But Its Social Engineering Steals Your Data

By |2018-06-26T16:55:46-05:00July 1st, 2018|Categories: Android, Google, Cyber Security, Mobile, Social Media|Tags: , , , , , , , , , , , , , , , , , |

Google Play is a walled garden, but the serpents always manage to find their way in.  There is a new snake in the grass with a tempting offer on its forked tongue: an app that "saves the battery" in your mobile device. It begins with a vaguely plausible pop-up: "Samsung clean-up might be required! Your [...]

What Is Angler Phishing And How Do I Avoid Becoming A Victim?

By |2018-06-20T08:18:40-05:00June 15th, 2018|Categories: phishing, Cyber Security|Tags: , , , , , , , , , , , |

What is Angler Phishing? Angler phishing is the practice of masquerading as a customer service account on social media, hoping to reach a disgruntled consumer. About 55% of such attacks last year targeted customers of financial institutions, trying to lure victims into handing over access to their personal data or account credentials. How Angler Phishing Works Angler [...]