Excel XLL Add-ins Are Pushing a Password-stealing Malware

Malicious hackers are distributing Excel XLL files that download and install the RedLine password and information-stealing malware via website contact forms and discussion forums. What Are XLL Files? XLL files…

Enter the Heimdal™ Social Media Giveaway for a Chance to Win Holiday Goodies

Happy holidays from us to you! As the gift-giving season draws near, we are very excited to announce our first time ever social media giveaway! Make sure you follow us…

Stealthy ‘WIRTE’ Gang Targets Middle Eastern Governments

Kaspersky researchers suspect that the cyberattackers may be a subgroup of the politically motivated, Palestine-focused Gaza Cybergang. A threat actor tracked as WIRTE has been assaulting Middle East governments since…

ScarCruft APT Mounts Desktop/Mobile Double-Pronged Spy Attacks

The North Korea-linked group is deploying the Chinotto spyware backdoor against dissidents, journalists and other politically relevant individuals in South Korea. The North Korea-linked ScarCruft advanced persistent threat (APT) group…

Reply-Chain Email Cyberattacks Hit Ikea’s Email Systems

Hackers are making use of stolen reply-chain emails in a wave of phishing attacks targeting Ikea’s employees. Reply-Chain Email Cyberattacks Targeting Ikea According to BleepingComputer publication, the company has started…

Application Whitelisting Concepts: Definition, Types, Implementation and Best Practices

The simplest way to stop malicious code from infiltrating your network is by automatically blocking it before it even enters the system. A straightforward and efficient way to achieve that…

Hackers Exploit ProxyLogon and ProxyShell Bugs in Phishing Blitz

Hackers Exploit ProxyLogon and ProxyShell Bugs in Phishing Blitz Security researchers have warned attackers are abusing months-old Microsoft Exchange Server flaws to send convincing malware-laden phishing emails within organizations. A team…

Squirrelwaffle Exploits ProxyShell and ProxyLogon to Hijack Email Chains

Trend Micro – Trend Micro – Squirrelwaffle Exploits ProxyShell and ProxyLogon to Hijack Email Chains Exploits & Vulnerabilities Squirrelwaffle is known for using the tactic of sending malicious spam as…

The Notorious Emotet Is Back: What Organizations Need to Know

Almost a year after an international law enforcement effort supposedly defeated it, Emotet, aka “the world’s most dangerous botnet,” has returned. Earlier this week, German security researcher Luca Ebach reported…

All You Need to Know About Black Friday Scams: How to Recognize Them and Stay Safe

Black Friday is approaching and in the run-up to the huge sales day, you should stay safe when it comes to the scams and tricks that malicious actors might try…