Norton Names Tech Support Phishing Scams Top Threat

Security Intelligence – Security Intelligence – Norton Names Tech Support Phishing Scams Top Threat Got a pop-up message from tech support? It’s probably not the real thing. Tech support scams…

Fake Adobe Windows App Installer Packages Are Distributing the Emotet Malware

Emotet is a malware known as a banking Trojan. Malspam, which are spam emails that contain malware, is the primary means by which it spreads. To persuade consumers, these communications…

RedCurl Makes a Comeback: They Also Have Updated Hacking Tools

The Group-IB researchers have revealed in a recent report the returning of a reportedly corporate cyber-espionage hacker group dubbed RedCurl. RedCurl APT Group: Background The Group-IB experts discovered this APT…

Phishing: Attackers Use DocuSign to Send Malicious Links

Security Intelligence – Security Intelligence – Phishing: Attackers Use DocuSign to Send Malicious Links Attackers are abusing the electronic agreement management company DocuSign to send phishing links and documents. Inside…

What is Spear Phishing? Definition, Examples, Prevention Strategies

What is spear phishing, you ask? Long story short, it’s a phishing technique that plays on the victim’s trust or, rather his gullibility. Spear phishing attacks are surgical, while general…