Uncategorized


As Twitter Plans To Charge Verified Users $8 Fee, Threat Actors Start Launching Phishing Campaigns Exploiting The Situation

As Twitter Plans To Charge Verified Users $8 Fee, Threat Actors Start Launching Phishing Campaigns Exploiting The Situation

Scammers and hackers are exploiting the confusion regarding Twitter’s new CEO, Elon Musk’s plans for paid blue ticks on the platform. They are sending phishing emails disguised as official Twitter notices and luring users into sharing their details. This post covers the details regarding such phishing schemes.

(more…)

Phishing Scams Revolving Around Covid-19 Vaccines: How To Remain Secure Against Such Attacks

Phishing Scams Revolving Around Covid-19 Vaccines: How To Remain Secure Against Such Attacks

Attempts by malicious actors to infiltrate organizations and individuals’ personal space through a wide variety of phishing exercises are widespread. From crude attempts at garnering the unwitting user’s confidence to overcoming large organizations’ anti-phishing filters, malicious actors have been at the top of their game. There has been a surge in data breach attempts, as pointed out by numerous cyber intelligence units worldwide.

(more…)

Why Companies Need Cloud-based Phishing Protection Software Now More Than Ever

Why Companies Need Cloud-based Phishing Protection Software Now More Than Ever

Coronavirus has changed our way of doing business, at least for the time being. And of all the changes it has brought about, the greatest impact is the dramatic increase in the number of remote workers.

One of the least discussed consequences of this mass migration to remote work is how the workers, who used to be safely ensconced in the organization’s network, are now left out there on their own. And home networks are rarely as well protected as corporate networks.

(more…)

Using Microsoft’s OneDrive? Be Afraid, be Very Afraid.

Using Microsoft’s OneDrive? Be Afraid, be Very Afraid.

Cloud-based storage is a wonderful thing. Being able to store your files and retrieve them from anywhere boosts productivity. It should come as no surprise then that Microsoft entered the cloud-based storage arena back in 2007. It should also come as no surprise that Microsoft’s cloud-storage product, called OneDrive, is the target of and vehicle for, phishing attacks. Afterall, Microsoft is the second favorite target of phishing attacks.

(more…)

Protecting Against Phishing is Even Harder With Invisible Links

Protecting Against Phishing is Even Harder With Invisible Links

Employees who have been trained to look out for phishing emails know not to click on links in suspicious emails. But what if the email tricks them into clicking on a link they didn’t intend to click on because it’s invisible?

According to a presentation by the security education firm KnowBe4, one of the newest forms of email compromise is a type of clickjacking which incorporates an invisible link (using the opacity setting in CSS). The link is instead replaced by a “bothersome” graphic element that’s made to look like a small hair or a speck of dust just like this:

(more…)

Recovering from a Phishing Attack

Recovering from a Phishing Attack

So you tried your best to avoid a phishing attack but one day your laptop woke up with the flu bug. Criminals use phishing attacks to try to get at your personal information. You receive a legitimate-looking email with a link or attachment attached and you take the bait. After the initial shock wears off what do you do?

First and foremost, disconnect your device immediately to get offline. The criminal could be in the process of installing ransomware on your computer. So if you have a wire connection, simply unplug the internet cable. If your device is wireless, disconnect it from the wifi network.

(more…)