Cyber Security News
Beware Of Phishing Emails Prompting Execution Via Paste (CTRL+V)
Phishing attackers are distributing malicious HTML files as email attachments, containing code designed to exploit users by prompting them to directly paste and execute...
Cyber Attack
CarnavalHeist Weaponizing Word Documents To Steal Login Credentials
Hackers take advantage of Word documents as weapons due to their widespread use and trust.This is facilitated by the ease with which users...
Cyber Security News
Hackers Exploiting Docusign With Phishing Attack To Steal Credentials
Hackers prefer phishing as it exploits human vulnerabilities rather than technical flaws which make it a highly effective and low-cost attack method. Phishing attacks can...
Cyber AI
Phishing Attacks Rise By 58% As The Attackers Leverage AI Tools
AI-powered generative tools have supercharged phishing threats, so even newbie attackers can effortlessly create refined, individualized campaigns.Protecting data and systems from this democratization of...
Cyber Attack
Beware Of Weaponized Zip Files That Deliver WINELOADER Malware
APT29, a Russian threat group, targeted German political parties with a new backdoor called WINELOADER using spear-phishing emails containing malicious links to ZIP files...
Cyber Crime
North Korean Hackers Abuse DMARC To Legitimize Their Emails
DMARC is targeted by hackers as this serves to act as a preventative measure against email spoofing and phishing attempts. They compromise DMARC (Domain-based Message...
Email
Trustifi’s Email Security Awareness Training – Empowering MSPs to Train & Protect Clients
In today's digital landscape, email security has become a critical concern for businesses of all sizes. As cyber threats continue to evolve, it's essential...
CVE/vulnerability
Microsoft’s Exchange Server Hack: Key Rotation Flaw Triggers Breach
Storm-0558, a cyberespionage group affiliated with the People's Republic of China, has reportedly compromised Microsoft Exchange mailboxes of 22 organizations and over 500 individuals...