phishing
-
Blog
Phishing emails increasingly use SVG attachments to evade detection
Threat actors increasingly use Scalable Vector Graphics (SVG) attachments to display phishing forms or deploy malware while evading detection. Most images on the web are JPG or PNG files, which are made of grids of tiny squares called pixels. Each pixel has a specific color value, and together, these pixels form the entire image. SVG, or Scalable Vector Graphics, displays…
Read More » -
Blog
What to do if you click on a phishing link
That heart-stopping moment when you click a link and instantly realize it was a mistake. According to the FBI’s Internet Crime Report 2023, you’re not alone – phishing attacks cost Americans $704.7 million last year, and one click can lead to devastating consequences. The golden hour: Your first 60 minutes matter “The first hour after clicking a suspicious link is…
Read More » -
Blog
Don’t Take the Bait on These Phishing Scams
Key Takeaways Phishing scams use social engineering and urgency to manipulate you into making bad decisions. You can spot red flags in suspicious emails by checking sender address and link destinations. Common phishing scams imitate banks or social media to trigger fear and prompt quick reactions. Verify through trusted methods instead. Email phishing scams have been around for a long…
Read More » -
Blog
Phishing tactics: The top attacks trends in 2024
Phishing is one of the simplest attack methods, but it is also among the most effective. Email addresses are easily stolen in cyber attacks, then used to target employees to persuade them to hand over data or download malware. A recent attack on greater Manchester councils is a prime example. It led to thousands of users being sent a phishing…
Read More » -
Blog
Phishing Attacks on Australia Disguised as Atlassian
Enterprises across Australia and the APAC region have been warned that cyber criminals are exploiting popular platforms like Atlassian to launch more convincing phishing attacks on law firms and other corporations. These attacks aim to steal employee credentials and breach company cyber security defences. Ryan Economos, APAC field chief technology officer at email security firm Mimecast, told TechRepublic that such…
Read More » -
Blog
How hackers are using legitimate tools to distribute phishing links
As both security tools and employees have become more astute at detecting traditional phishing attacks, threat actors have turned to manipulating trusted platforms to distribute phishing links hidden in seemingly legitimate URLs. In one example of this approach, a report from Barracuda Networks published on 12 September detailed a rise in phishing attacks leveraging trusted content creation and collaboration platforms.…
Read More » -
Blog
How not to conduct cyber awareness training: UCSC slammed for ‘tone deaf’ Ebola phishing tests
The University of California Santa Cruz (UCSC) has come under fire after it conducted phishing training using a fake Ebola virus track and trace alert. Security experts have criticized the test after it caused panic on campus, forcing senior leaders at the university to come out and publicly acknowledge its error of judgment. On 18 August 2024, UCSC’s IT department…
Read More » -
Blog
Threat Actors Exploit Microsoft Sway to Host QR Code Phishing Campaigns
A new report from cybersecurity company Netskope reveals details about attack campaigns abusing Microsoft Sway and CloudFlare Turnstile and leveraging QR codes to trick users into providing their Microsoft Office credentials to the phishing platform. These campaigns have targeted victims in Asia and North America across multiple segments led by technology, manufacturing, and finance. What is quishing? QR codes are…
Read More » -
Blog
Hackers are flocking to a new SMS spam tool – ‘Xeon Sender’ exploits cloud APIs and exposed credentials to supercharge phishing campaigns
Security researchers have issued a warning over a phishing tool that threat actors can use via SaaS providers to send spam messages en-masse. The tool, dubbed ‘Xeon Sender’ by SentinelLabs, is a cloud-based attack tool that can send spam messages via nine different SaaS providers. The tool is also known by alternative names, including ‘XeonV5’ and ‘SVG Sender’. It’s built…
Read More » -
Blog
Thousands targeted with phishing emails after cyber attack on Greater Manchester councils
A major cyber attack that’s hit councils across Greater Manchester has highlighted the risks local authorities face. The attack on Locata affected the housing websites for Manchester, Salford, and Bolton councils, which are run by the software firm. It’s led to thousands of users being sent a phishing email asking them to ‘activate your tenancy options’ and hand over their…
Read More »