Norton Names Tech Support Phishing Scams Top Threat

Security Intelligence – Security Intelligence – Norton Names Tech Support Phishing Scams Top Threat Got a pop-up message from tech support? It’s probably not the real thing. Tech support scams…

CEO Fraud Emails – Not Every Money Transfer Request You Receive Is Legit

You know the saying If it’s too good to be true, then it probably is? The same could go with If it’s too pressing to be true, it probably is…

‘Seedworm’ Attackers Target Telcos in Asia, Middle East

The focused attacks aimed at cyberespionage and lateral movement appear to hint at further ambitions by the group, including supply-chain threats. Attackers targeting telcos across the Middle East and Asia…

Omicron Phishing Scam Already Spotted in UK

Omicron COVID-19 variant anxiety inspires new phishing scam offering fake NHS tests to steal data. The global pandemic has provided cover for all sorts of phishing scams over the past…

Fake Adobe Windows App Installer Packages Are Distributing the Emotet Malware

Emotet is a malware known as a banking Trojan. Malspam, which are spam emails that contain malware, is the primary means by which it spreads. To persuade consumers, these communications…

Bitdefender Threat Debrief | November 2021

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and research from the previous month. You can find all previous debriefs here. Highlight of the month:…

Black Friday shopping? FBI says beware of these holiday scams and phishing threats

With Thanksgiving underway and Black Friday sales about to arrive, the FBI has warned consumers to be wary of online-shopping scams and phishing attackers using big brands to steal online…

Consent phishing: How attackers abuse OAuth 2.0 permissions to dupe users

When cybercrime historians look back on the first half of the 21st century, they will undoubtedly point to phishing as the most successful, and therefore, the most prevalent technique used…

RedCurl Makes a Comeback: They Also Have Updated Hacking Tools

The Group-IB researchers have revealed in a recent report the returning of a reportedly corporate cyber-espionage hacker group dubbed RedCurl. RedCurl APT Group: Background The Group-IB experts discovered this APT…

What Is Email Spoofing and How to Stay Protected

Email spoofing is a type of cyberattack in which a threat actor is sending emails with a fake sender address. In email spoofing, attackers can make it seem like an…