tactics

  • Blog

    Fresh warning issued over encryption-less ransomware as notorious threat group shifts tactics

    Security agencies have updated their information on notorious ransomware gang BianLian, warning the group has shifted its tactics and is moving away from encryption based attacks. A cybersecurity advisory issued by the FBI, CISA, and Australia Cyber Security Centre was recently updated on 20 November 2024 to reflect a change in tactics from the group, signaling a potentially wider shift…

    Read More »
  • Blog

    Vishing, Wangiri, and Other VoIP Fraud Tactics On the Rise

    VoIP fraud is a serious and growing threat to businesses, with attackers increasingly targeting cloud phone systems to exploit vulnerabilities for financial gain. This type of fraud involves unauthorized access to a VoIP network, often for making costly international calls or redirecting traffic to premium-rate numbers. But there are many types of VoIP fraud, and not all of them rely…

    Read More »
  • Blog

    Midnight Blizzard is on the rampage again, and enterprises should be wary of its new tactics

    Microsoft is warning of a Russia-linked spear phishing campaign targeting government, academia, defense and NGOs. The notorious Midnight Blizzard group – also known as APT29 and Cozy Bear – has been carrying out its campaign in dozens of countries. As with its earlier phishing campaigns, it’s been particularly active in the UK, Europe, Australia, and Japan. The campaign is still…

    Read More »
  • Blog

    Phishing tactics: The top attacks trends in 2024

    Phishing is one of the simplest attack methods, but it is also among the most effective. Email addresses are easily stolen in cyber attacks, then used to target employees to persuade them to hand over data or download malware. A recent attack on greater Manchester councils is a prime example. It led to thousands of users being sent a phishing…

    Read More »
  • Blog

    The Iran cyber threat: Breaking down attack tactics

    The Iran cyber threat often comes last when mentioned alongside the other so-called “CRINK” attackers, China, Russia, and North Korea. But the risk posed by the country is growing fast, evolving from simple website defacement to attacks on critical national infrastructure (CNI) and more recently, significant US election interference. In August, US intelligence officials confirmed that Iran was behind a…

    Read More »
Back to top button
close