Threat actors use bogus ‘shipping delays’ to deceive customers and businesses. Troy Gill, senior manager of threat intelligence at Zix, discusses how spoofing is evolving and what to do.
Source: Read More (Threatpost)
Threat actors use bogus ‘shipping delays’ to deceive customers and businesses. Troy Gill, senior manager of threat intelligence at Zix, discusses how spoofing is evolving and what to do.
Source: Read More (Threatpost)
Check Point Research (CPR) has spotted new malware that is actively being distributed through Microsoft’s official store. With over 5,000 machines already affected, the malware continually executes attacker commands,such as controlling social media accounts on Facebook, Google and Sound Cloud. The malware can register new accounts, log in, comment on and “like” other posts. Source: […]
China-based hackers actively target US defense and software companies using a vulnerability in the SolarWinds Serv-U FTP server. […] Source: Read More (BleepingComputer)
Some said a worm weaponizing Log4Shell was their “greatest concern,” while others dismissed fears about it as “overblown.” Source: Read More (Latest topics for ZDNet in Security)