Browsing tag

Phishing attacks

Nation State Hackers Exploiting Zero-Day in Roundcube Webmail Software

The threat actor known as Winter Vivern has been observed exploiting a zero-day flaw in Roundcube webmail software on October 11, 2023, to harvest email messages from victims’ accounts. “Winter Vivern has stepped up its operations by using a zero-day vulnerability in Roundcube,” ESET security researcher Matthieu Faou said in a new report published today. […]

Google: Russian Hackers Target Ukrainians, European Allies via Phishing Attacks

A broad range of threat actors, including Fancy Bear, Ghostwriter, and Mustang Panda, have launched phishing campaigns against Ukraine, Poland, and other European entities amid Russia’s invasion of Ukraine. Google’s Threat Analysis Group (TAG) said it took down two Blogspot domains that were used by the nation-state group FancyBear (aka APT28) – which is attributed […]

New Ransomware Attack – Texas Government agencies become Victim

Still, Ransomware attacks become a problem on local governments, and Texas discovers this first-hand. On the morning of August 16, 23 government entities reported a ransomware attack. Most were “smaller local governments,” and the State of Texas networks and systems were not hit by the Department of Information Resources. “It appears all entities that were […]

Detecting and Defending Against Phishing Attacks

One of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit card information, security passwords, or any other sensitive information, hackers can use different techniques, such as social engineering, emails, phone calls, and other forms of communication, to steal data. This opens up businesses […]

Phishing Attacks Still Trending And On The Rise

GreatHorn, an incident-response consulting firm has released their Email Security, Challenges, Trends and Benchmark Report 2019 revealing that the corporate world and email users, in general, has not yet learned its lessons with regards to safeguarding from phishing attacks. The study GreatHorn said aims to increase awareness with regards to email-based threats and the continued […]

TrickBot’s “TrickBooster” Update Compromised 250M Emails

Last Valentines day, we made a fearless declaration here in Hackercombat.com, that Trickbot is shaping itself of becoming the “malware of the year”, due to its massive campaigns of infecting computers worldwide. That will remain as our forecast; Trickbot was recently named by the DeepInstinct security researchers as responsible for the compromise of at least […]

Email Remains The Biggest Vulnerability, According To A Survey

Ever since email came into existence in the 1990s and the high level of awareness of the risks involved, 94% of the organizations surveyed said that it was still a major vulnerability. At the same time, email threats are expected to increase in the coming year, according to 87% of the 280 decision-makers in Europe, […]

Whaling Attack: Why Should CEOs Be Afraid?

Being the president of a Fortune 500 company is something many people aspire to be. The perks of the position go beyond the wildest dreams and are often highlighted in many Hollywood films. But being the CEO of a large company isn’t all fun and games: CEOs have access to confidential company documents and the […]

Phishing Definition: What You Need to Know

The phishing definition from the United States Computer Emergency Readiness Team, or US-CERT, says that this is a form of social engineering that makes use of emails or malicious websites (and other channels) to steal personal information from a person or even a company by posing as a trustworthy entity. Phishing attacks use email as […]

Most Important Cyber Attack Techniques that often used by Hackers

The cyber attack occurs on a daily basis, and these can range from attacks on tech giants to individuals falling foul to the many scams which are present online. Thankfully, there are ways in which people and groups at both ends of the scale can reduce their level of susceptibility to attacks, with virtual private […]

Data Breach Hits Australian Tech Unicorn Canva

A massive data breach has hit Canva, the Australian tech unicorn based in Sydney. It was ZDNet that reported, on May 24, 2019, the hack that had happened earlier that day. The hacker, known by the name GnosticPlayers, had tipped off ZDNet that during the breach at the Sydney-based start-up, data for roughly 139 million […]

Sharp Rise in Phishing Attacks against SaaS, Webmail Services

Phishing attacks against businesses offering SaaS (Software-as-a-service) and web-based email services have increased considerably in the first quarter of the current year, as per a recent report. According to the Phishing Activity Trends Report released by APWG (Anti-Phishing Working Group) and focusing on the period between January and March 2019, cybercrime groups have shifted their […]

Google to Block Sign-ins from Embedded Browser Frameworks

In a bid to improve its phishing protections and to protect users from MITM attacks, Google has come up with a new move- a decision to block users sign-in using Embedded browser frameworks. GBHackers on Security reports, “Google announced a new security update to block users sign-in using Embedded browser frameworks in order to improve […]

Things To Do To Defend Against Spear Phishing

  Phishing is a way to extract confidential data from individuals and businesses. Mostly by creating fake Web pages or send emails to disclose login names, passwords, credit card information, etc. Once cybercriminals have the data that they are looking for, they can easily steal money and personal information from the poor victims. Cybercriminals also […]

12 Most Common Subjects In Phishing Emails Used For Fooling Users

Phishing attacks via emails are pretty common these days for which cybercriminals have new ways of luring users into falling prey to such attacks with ease. According to a cybersecurity research firm Barracuda, one such method is using ‘clickbaity’ subject in a mail. Barracuda, after monitoring 360,000 emails in three months, has suggested that there are […]

Office 365, G Suite Cloud Accounts Hacked Using IMAP Protocol

Hackers are now using IMAP protocol to hack Office 365 and G Suite cloud accounts, bypassing multi-factor authentication; and these kinds of attacks are difficult to protect against, according to a recent research study. A six-month study by researchers at security firm Proofpoint reveals this and other findings. The team observed massive attacks that leveraged […]

Phishing attacks capable of bypassing multi-factor authentication increase

Gmail, from Google, is one of the main services that use this login method Network security and ethical hacking specialists from the International Institute of Cyber security ensure that malicious actors have been developing their methods to deploy phishing campaigns to the point where they are able to bypass multi factor authentication. “There has been a significant increase […]

URL Shorteners: The Vehicle Of Malicious Links

Phishers are in a huge advantage these days with the growth of social media platforms such as Facebook, Twitter, Instagram, and even Youtube. People can and continue to navigate away from those social media sites using shortened links, which is very convenient for everyone to use. This is especially through with microblogging site Twitter, as […]

Phishing Attacks Targeted At Nokia Smartphone

Nokia is a failed brand in the west, including in their native Finland since the emergence of the 2007 smartphone named Apple iPhone. After a solid decade of being the number 1 mobile phone hardware manufacturer, today Nokia only exist as a 3rd tier of Android devices now manufactured by HMD Global, after they bought […]

Phishing Attack In EyeSouth Breached 24000 Patient Records

Hackers see the healthcare industry as a lucrative target for hackers, why we say so is because we have seen this happening again and again. In 2017 we saw how criminals targeted hospitals with weaponized- ransomware, misconfigured cloud storage buckets and phishing emails. In 2018, it continued and this time the cybercriminals got more creative, […]