Articles on cyber-security and latest trends
How Effective Is Security Training in Preventing Cyber Attacks?
Do your security controls work?
New Insight into Cybercrime: Phishing-as-a-Service Platform
A new report shows that anyone interested in beginning a phishing campaign must pass through an open registration process on ‘Caffeine’. The Caffeine platform has an intuitive interface that it provides to users at a relatively low cost. It can also steal session cookies, which allows the attacker to access accounts without the need for MFA (multi factor authentication) tokens.
AiTM Phishing Attack Targeting Enterprise Users of Microsoft & Gmail Email Services
Phishing attacks would have started in mid-July 2022 with a plan similar to a social engineering campaign. Threat actors place a proxy server between the target user’s website and the phishing website. Google Workspace users are also targets for threats behind a large-scale campaign.
Anti-Phishing Solutions: Anyone can be a victim of a phishing attack
Evaldas Rimasauskas allegedly posed as an Asian company representative to steal $100 million from Google and Facebook. Employees sent funds to overseas bank accounts after receiving emails from him posing as representatives of Quanta Computer, a Taiwan-based electronics manufacturer.
How Does a DMARC Generator Minimize Fraudulent Emails & Phishing?
By prohibiting fraudsters from using your domain, the DMARC is essentially an email verification system that is intended to safeguard you from being scammed, phished, falsified, or a variety of other cybercrimes.
Ukraine Assembles an “IT army” to Launch Cyber-attacks on 31 Russian Entities.
The Minister of Digital transformation of Ukraine, Mikhail Fedorov announced the creation of an army of IT specialists.
Hive Ransomware Data Decryption
The researchers estimated the precision with which they might reconstruct the master key and the number of encrypted files that could be recovered with such a partially known master key by doing various trials.
The Importance of Password Protection Intelligence
Password protection has a number of well-known disadvantages. One of them, though, has gotten remarkably little notice. That’s how and when businesses can find out if their data has been hacked by outsiders.