Category: HelpnetSecurity

Organizations spend 100 hours battling post-delivery email threats
30
May
2023

Organizations spend 100 hours battling post-delivery email threats

Nearly every victim of a spear-phishing attack in the last 12 months saw impacts on their organization, including malware infections,…

Top public cloud security concerns for the media and entertainment industry
29
May
2023

Top public cloud security concerns for the media and entertainment industry

Media and entertainment (M&E) companies are rapidly turning to cloud storage in efforts to upgrade their security measures, according Wasabi….

Company size doesn't matter when it comes to cyberattacks
29
May
2023

Company size doesn’t matter when it comes to cyberattacks

65% of organizations in the enterprise sector suffered a cyberattack within the last 12 months, which is similar to the…

Digital nomads drive changes in identity verification
29
May
2023

Digital nomads drive changes in identity verification

Over the past year, 4 in 5 financial companies had experienced an increase in the number of verification cases involving…

Week in review: Zyxel firewalls vulnerability, phishing campaign targets ChatGPT users
28
May
2023

Week in review: Zyxel firewalls vulnerability, phishing campaign targets ChatGPT users

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Wireless Broadband Alliance CEO on…

Threat actors exploit new channels for advanced phishing attacks
26
May
2023

Threat actors exploit new channels for advanced phishing attacks

Perception Point’s team has identified a 356% increase in the number of advanced phishing attacks attempted by threat actors in…

New infosec products of the week: May 26, 2023
26
May
2023

New infosec products of the week: May 26, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Axiado, Delinea, Netscout, Radware, and…

New Buhti ransomware uses leaked payloads and public exploits
26
May
2023

New Buhti ransomware uses leaked payloads and public exploits

A newly identified ransomware operation has refashioned leaked LockBit and Babuk payloads into Buhti ransomware, to launch attacks on both…

Phishers use encrypted file attachments steal Microsoft 365 account credentials
26
May
2023

Phishers use encrypted file attachments steal Microsoft 365 account credentials

Phishers are using encrypted restricted-permission messages (.rpmsg) attached in phishing emails to steal Microsoft 365 account credentials. “[The campaigns] are…

Cybercriminals masquerading as MFA vendors
26
May
2023

Cybercriminals masquerading as MFA vendors

Cybercriminals are increasingly posing as multi-factor authentication vendors and small businesses are becoming more popular targets, according to VIPRE. Attachment-based…

Fresh perspectives needed to manage growing vulnerabilities
26
May
2023

Fresh perspectives needed to manage growing vulnerabilities

In its inaugural 2023 Offensive Security Vision Report, NetSPI unveils findings that highlight vulnerability trends across applications, cloud, and networks….

Phishing campaign targets ChatGPT users
25
May
2023

Phishing campaign targets ChatGPT users

A clever phishing campaign aimed at stealing users’ business email account credentials by impersonating OpenAI, the company behind the ChatGPT…