QR codes are everywhere: you can see them on posters and leaflets, ATM screens,…
-
-
Data BreachSecurity
Shelter from the storm – lessons learned from the Storm-0558 Microsoft email attacks
Unless you’ve been living under a rock, you’ve probably read or heard about the…
-
Aug 25, 2023THNEmail Security / Vulnerability The U.S. Federal Bureau of Investigation (FBI) is…
-
-
Cybercriminals are adopting advanced phishing tactics, using legitimate services like Amazon Web Services (AWS)…
-
Sector Vulnerabilities: Indusface’s research reveals that the Education sector is the most susceptible to…
-
Aug 02, 2023THNVulnerability / A sophisticated Facebook phishing campaign has been observed exploiting a…
-
Jul 29, 2023THNEmail Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
-
Jul 14, 2023THNEmail Security / Vulnerability Zimbra has warned of a critical zero-day security…
-
Network SecuritySecurity
Business email compromise scams take new dimension with multi-stage attacks
In a campaign that exploits the relationships between different organizations, attackers managed to chain…