You might be interested in …

[SANS ISC] Phishing asking recipients not to report abuse, (Tue, Jun 22nd)

All posts, Sans-ISC

It can be a little disheartening to deal with well-prepared phishing attacks every day, since one can easily see how even users who are fully “security-aware” could fall for some them. The messages don’t even have to be too complex to be believable. For example, a message containing seemingly innocuous text and a link that […]

Read More

[ThreatPost] Widespread Brute-Force Attacks Tied to Russia’s APT28

All posts, ThreatPost

The ongoing attacks are targeting cloud services such as Office 365 to steal passwords and password-spray a vast range of targets, including in U.S. and European governments and military. Source: Read More (Threatpost)

Read More

[ZDNet] Microsoft: This unusual Windows and Linux malware does everything it can to stay on your network

All posts, ZDNet

LemonDuck coin-mining malware has been crafted by some very determined, financially-motivated cybercriminals. Source: Read More (Latest topics for ZDNet in Security)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.