[ThreatPost] Cybercriminals Love Supply-Chain Chaos: Here’s How to Protect Your Inbox

Threat actors use bogus ‘shipping delays’ to deceive customers and businesses. Troy Gill, senior manager of threat intelligence at Zix, discusses how spoofing is evolving and what to do.

Source: Read More (Threatpost)

You might be interested in …

[NCSC-FI News] New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications on Microsoft’s Official Store

Check Point Research (CPR) has spotted new malware that is actively being distributed through Microsoft’s official store. With over 5,000 machines already affected, the malware continually executes attacker commands,such as controlling social media accounts on Facebook, Google and Sound Cloud. The malware can register new accounts, log in, comment on and “like” other posts. Source: […]

Read More

[BleepingComputer] Chinese hackers use new SolarWinds zero-day in targeted attacks

China-based hackers actively target US defense and software companies using a vulnerability in the SolarWinds Serv-U FTP server. […] Source: Read More (BleepingComputer)

Read More

[ZDNet] Cybersecurity experts debate concern over potential Log4j worm

All posts, ZDNet

Some said a worm weaponizing Log4Shell was their “greatest concern,” while others dismissed fears about it as “overblown.” Source: Read More (Latest topics for ZDNet in Security)

Read More