The Latest in IT Security

Posts Tagged ‘e-mail security’

A business email compromise campaign emanating out of Western Africa is targeting companies in a wide swathe of industries, bucking a trend of these scams focusing on wire fraud and targeting CEOs. The criminals are using phishing emails with links redirecting victims to sites designed to harvest corporate email credentials. Researchers at Flashpoint said it’s […]

Read more ...

Files allegedly containing doping information on FIFA soccer players were leaked online by the Fancy Bears (also known as APT28, Pawn Storm, Sednit, Sofacy, Tsar Team and Strontium) hacking group, as part of an “OpOlympics” campaign. The leaked emails contain information about soccer players using illegal substances or therapeutic use exemptions (TUEs). Apart from a […]

Read more ...

At the start of Q2 2017, we registered a wave of malicious mailings imitating notifications from well-known delivery services. Trojan downloaders were sent out in ZIP archives, and after being launched they downloaded other malware – Backdoor.Win32.Androm and Trojan.Win32.Kovter. The usual trick of presenting dangerous content as important delivery information was employed by the…

Read more ...


Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments