What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
knowbe4.webp 2025-04-22 13:01:39 Les acteurs de la menace abusent de plus en plus des outils d'IA pour aider avec les escroqueries
Threat Actors Are Increasingly Abusing AI Tools to Help With Scams
(lien direct)

Threat Actors Are Increasingly Abusing AI Tools to Help With Scams
Tool Threat ★★★
knowbe4.webp 2025-03-27 21:07:44 Rapport: le phishing reste la cyber-menace la plus répandue
Report: Phishing Remains the Most Prevalent Cyber Threat
(lien direct)

Report: Phishing Remains the Most Prevalent Cyber Threat
Threat ★★★
knowbe4.webp 2025-03-20 14:28:47 Les principaux plats à retenir du rapport Knowbe4 2025 Rapport de menaces de phishing
Key Takeaways from the KnowBe4 2025 Phishing Threat Trends Report
(lien direct)
clés les plats à partir du rapport de menace de phishing 2025 Notre dernier Rapport des tendances de la menace de phishing href = "https://www.knowbe4.com/resource-center/phishing"> phishing paysage en 2025, des tactiques renouvelées aux techniques d'attaque émergentes.
Key Takeaways from the 2025 Phishing Threat Trends Report Our latest Phishing Threat Trends Report explores the evolving phishing landscape in 2025, from renewed tactics to emerging attack techniques.
Threat ★★★
knowbe4.webp 2025-03-07 14:13:54 Facture ou usurpation d'identité? 36,5% de pic dans les attaques de phishing tirant parti de QuickBooks \\ 'Domaine légitime en 2025
Invoice or Impersonation? 36.5% Spike in Phishing Attacks Leveraging QuickBooks\\' Legitimate Domain in 2025
(lien direct)
Threat ★★
knowbe4.webp 2025-03-05 14:11:50 [Tête haute] L'attaque de phishing sophistiquée utilise un nouvel astuce d'obscuscations JavaScript
[Heads Up] Sophisticated Phishing Attack Uses New JavaScript Obfuscation Trick
(lien direct)
Threat ★★★
knowbe4.webp 2025-02-20 17:54:32 Spear Phishing is the Top Cyber Threat to the Manufacturing Sector (lien direct) Spear Phishing is the Top Threat to the Manufacturing Sector Spear phishing was the top cybersecurity threat to the manufacturing sector over the past six months, according to a report from ReliaQuest. These attacks accounted for 41% of true-positive alerts in the sector.
Spear Phishing is the Top Threat to the Manufacturing Sector Spear phishing was the top cybersecurity threat to the manufacturing sector over the past six months, according to a report from ReliaQuest. These attacks accounted for 41% of true-positive alerts in the sector.
Threat ★★★
knowbe4.webp 2025-01-15 15:34:45 Japan Attributes More Than 200 Cyberattacks to China Threat Actor "MirrorFace" (lien direct) Japan Attributes More Than 200 Cyberattacks to China Japan\'s National Police Agency (NPA) has attributed more than 200 cyber incidents over the past five years to the China-aligned threat actor “MirrorFace,” Infosecurity Magazine reports.
Japan Attributes More Than 200 Cyberattacks to China Japan\'s National Police Agency (NPA) has attributed more than 200 cyber incidents over the past five years to the China-aligned threat actor “MirrorFace,” Infosecurity Magazine reports.
Threat Legislation ★★
knowbe4.webp 2024-11-20 15:40:54 Threat Actors are Sending Malicious QR Codes Via Snail Mail (lien direct)
Threat Actors are Sending Malicious QR Codes Via Snail Mail
Threat ★★
knowbe4.webp 2024-11-13 20:08:32 Criminal Threat Actor Uses Stolen Invoices to Distribute Malware (lien direct)
Criminal Threat Actor Uses Stolen Invoices to Distribute Malware
Malware Threat ★★
knowbe4.webp 2024-08-19 12:34:46 Ransomware Group connu sous le nom de \\ 'royal \\' se renforce comme noire et tire parti de nouvelles méthodes d'attaque
Ransomware Group Known as \\'Royal\\' Rebrands as BlackSuit and Is Leveraging New Attack Methods
(lien direct)
 groupe de ransomware connu sous le nom de \\ 'royal \' renforcez-le en tant que Noir et augmente la mise, exigeant plus de 500 millions de dollars en rançon en rançon Le groupe de menaces de ransomware anciennement connu sous le nom de "Royal" s'est rebaptisé comme noir et a mis à jour ses méthodes d'attaque, prévient le FBI.
Ransomware Group Known as \'Royal\' Rebrands as BlackSuit and Ups the Ante, Demanding More Than $500 Million in Ransoms The ransomware threat group formerly known as "Royal" has rebranded itself as BlackSuit and updated their attack methods, warns the FBI.
Ransomware Threat ★★★
knowbe4.webp 2024-08-12 21:15:08 Histoires de pirate: une menace physique Facebook
Hacker Stories: A Facebook Physical Threat
(lien direct)
Threat ★★★
knowbe4.webp 2024-07-30 17:47:32 Les organisations se préparent à des cyberattaques plus évoluées basées sur l'IA à mesure que Deepfakes deviennent les principales préoccupations
Organizations Prepare for More Evolved AI-Based Cyber Attacks as Deepfakes Become Top Concern
(lien direct)
Threat ★★★
knowbe4.webp 2024-07-18 17:41:32 Cyber ​​Menaces ciblant les Jeux olympiques de Paris 2024
Cyber Threats Targeting the 2024 Paris Olympics
(lien direct)
Nos amis du Cyberwire ont rapporté: "Zerofox et Fortinet ont tous deux publié des rapports sur les menaces auxquelles sont confrontés les Jeux olympiques de 2024 à Paris. Zerofox & nbsp; dit & nbsp; La principale menace de cybersécurité sera des cyberattaques à partir de cyberattaques deLa Russie, qui est «susceptible de prendre la forme d'attaques DDOS, de compromis de données et d'escroqueries menées par les groupes d'acteurs de menace russe».
Cyber Threats Targeting the 2024 Paris Olympics Our friends at the CyberWire reported: "ZeroFox and Fortinet have both published reports on threats facing the 2024 Olympics in Paris. ZeroFox says the primary cybersecurity threat will be cyberattacks from Russia, which are "likely to take the form of DDoS attacks, data compromises, and scams carried out by Russian threat actor groups."
Threat ★★★
knowbe4.webp 2024-07-17 17:50:47 Le nouveau groupe de menaces de ransomware appelle les victimes d'attaque pour assurer les paiements
New Ransomware Threat Group Calls Attack Victims to Ensure Payments
(lien direct)

New Ransomware Threat Group Calls Attack Victims to Ensure Payments
Ransomware Threat ★★★
knowbe4.webp 2024-07-16 15:40:00 Les groupes de menaces intentionnelles d'espionnage utilisent désormais les ransomwares comme tactique de détournement dans les cyberattaques
Espionage-Intent Threat Groups Are Now Using Ransomware as a Diversion Tactic in Cyberattacks
(lien direct)

Espionage-Intent Threat Groups Are Now Using Ransomware as a Diversion Tactic in Cyberattacks
Ransomware Threat ★★★
knowbe4.webp 2024-07-05 18:00:10 Les campagnes de phishing parrainées par l'État ciblent 40 000 personnes VIP
State-Sponsored Phishing Campaigns Target 40,000 VIP Individuals
(lien direct)
Threat Medical Cloud ★★★
knowbe4.webp 2024-06-18 17:58:40 Entités brésiliennes de plus en plus ciblées par les attaques de phishing de l'État-nation
Brazilian Entities Increasingly Targeted by Nation-State Phishing Attacks
(lien direct)
Phishing provient d'acteurs de menace basés en Chine, en Corée du Nord et en Russie.
Brazilian Entities Increasingly Targeted by Nation-state Phishing Attacks Mandiant has published a report looking at cyber threats targeting Brazil, finding that more than 85% of government-backed phishing activity comes from threat actors based in China, North Korea and Russia.
Threat ★★★
knowbe4.webp 2024-06-06 12:27:15 «Opération Endgame» se termine par l'arrestation de 4 suspects cybercriminaux et 100 serveurs
“Operation Endgame” Ends with the Arrest of 4 Cybercriminal Suspects and 100 Servers
(lien direct)
La saison 1 de Les efforts coordonnés entre les agences d'application de la loi dans neuf pays ont entraîné une perturbation majeure des logiciels malveillants d'un groupe de menaces et ransomware opérations.
“Operation Endgame” Season 1 Ends with the Arrests of 4 Cybercriminal Suspects and 100 Servers Coordinated efforts between law enforcement agencies across nine countries has resulted in a major disruption of a threat group\'s malware and ransomware operations.
Malware Threat Legislation ★★
knowbe4.webp 2024-05-29 18:42:27 Menage acteur void Manticore utilise des «essuie-glaces» de cyber-armes pour détruire les données et les systèmes
Threat Actor Void Manticore Uses Cyber Weapon “Wipers” to Destroy Data and Systems
(lien direct)

Threat Actor Void Manticore Uses Cyber Weapon “Wipers” to Destroy Data and Systems
Threat ★★
knowbe4.webp 2024-05-20 18:55:38 Un nouveau rapport sur les menaces conclut que près de 90% des cybermenaces impliquent l'ingénierie sociale
New Threat Report Finds Nearly 90% of Cyber Threats Involve Social Engineering
(lien direct)
Threat Studies ★★★
knowbe4.webp 2024-05-01 17:57:24 Les acteurs de la menace nord-coréenne ciblent les développeurs de logiciels avec des entretiens d'embauche de faux
North Korean Threat Actors Target Software Developers With Phony Job Interviews
(lien direct)

North Korean Threat Actors Target Software Developers With Phony Job Interviews
Threat ★★
knowbe4.webp 2024-04-11 12:19:04 Installations d'eau compromises par les acteurs de la menace iranienne
Water Facilities Compromised By Iranian Threat Actors
(lien direct)
> pourquoi vousDevrait s'inquiéter du secteur de l'eau confronté à des menaces de cybersécurité En décembre 2023, un joint Alerte a été publié par le FBI, la CISA, la NSA, l'EPA et l'incd concernant les cyber-acteurs iraniens appelés" cyberav3ngers "liés à l'Iran \\ ''S Islamic Revolutionary Guard Corps (IRGC).
Why You Should Be Worried About the Water Sector Facing Cybersecurity Threats In December 2023, a joint alert was issued by the FBI, CISA, NSA, EPA, and INCD regarding Iranian cyber actors known as "CyberAv3ngers" linked to Iran\'s Islamic Revolutionary Guard Corps (IRGC).
Threat ★★★
knowbe4.webp 2024-04-03 16:36:17 Le nouveau rapport montre que les liens de phishing et les attachements malveillants sont les principaux points d'entrée des cyberattaques
New Report Shows Phishing Links and Malicious Attachments Are The Top Entry Points of Cyber Attacks
(lien direct)
phishing et les utilisateurs Liste en tant que CyberAttack Initial Access Activers Les nouvelles données d'attaque TTP couvrant 2023 mettent en lumière les acteurs de la menace et les actions des utilisateurs qui mettent les organisations les plus à risque.
Phishing and Users Top List as Cyberattack Initial Access Enablers New TTP attack data covering 2023 sheds much needed light on the threat actor and user actions that are putting organizations at the most risk.
Threat Studies ★★★
knowbe4.webp 2024-03-29 16:07:32 Narwhal Spider Threat Group derrière une nouvelle campagne de phishing usurpant l'identité de cabinets d'avocats réputés
Narwhal Spider Threat Group Behind New Phishing Campaign Impersonating Reputable Law Firms
(lien direct)

Narwhal Spider Threat Group Behind New Phishing Campaign Impersonating Reputable Law Firms
Threat ★★
knowbe4.webp 2024-03-25 12:00:00 Les cyberattaques conscientes du nuage augmentent 110% alors que les groupes de menaces aiguisent leurs compétences d'attaque
Cloud-Conscious Cyber Attacks Spike 110% as Threat Groups Sharpen their Attack Skills
(lien direct)
Les cyberattaques conscientes du cloud augmentent 110% alors que les groupes de menaces aiguisent leurs compétences d'attaque Les nouvelles données montrent une expertise accrue dans la mise en œuvre et l'exploitation des environnements cloud.
Cloud-Conscious Cyberattacks Spike 110% as Threat Groups Sharpen their Attack Skills New data shows increased expertise in leveraging and exploiting cloud environments.
Threat Cloud ★★★
knowbe4.webp 2024-03-19 17:18:05 Phishing Tops 2023 \\'s la plus courante de la méthode d'accès à l'accès
Phishing Tops 2023\\'s Most Common Cyber Attack Initial Access Method
(lien direct)
Phishing Tops 2023 \'s Cyberattack Méthode d'accès initial le plus courant La nouvelle analyse montre que la combinaison de phishing , des e-mails, un accès à distance et des comptes compromis sont au centre de la plupart des acteurs de la menace.
Phishing Tops 2023\'s Most Common Cyberattack Initial Access Method New analysis shows that the combination of phishing, email, remote access, and compromised accounts are the focus for most threat actors.
Threat ★★
knowbe4.webp 2024-02-23 14:02:47 Près d'une cyberattaque sur trois en 2023 a impliqué l'abus de comptes valides
Nearly One in Three Cyber Attacks In 2023 Involved The Abuse of Valid Accounts
(lien direct)
 https://www.ibm.com/reports/thereat-intelligence Trente pour cent de tous les cyber-incidents en 2023 impliquaient des abus de références valides, selon le dernier indice de renseignement sur les menaces d'IBM X-Force.Cela représente une augmentation de soixante et onze pour cent par rapport à 2022.
https://www.ibm.com/reports/threat-intelligence Thirty percent of all cyber incidents in 2023 involved abuse of valid credentials, according to IBM X-Force\'s latest Threat Intelligence Index. This represents a seventy-one percent increase compared to 2022.
Threat Studies ★★★
knowbe4.webp 2024-02-14 13:57:40 AI dans le cyberespace: une épée à double tranchant
AI in Cyberspace: A Double-Edged Sword
(lien direct)
Ransomware Threat ★★★
knowbe4.webp 2024-01-31 18:52:23 Les paiements de ransomware sur le déclin alors que les cyberattaquants se concentrent sur les organisations les plus petites et les plus grandes
Ransomware Payments On The Decline As Cyber Attackers Focus on The Smallest, And Largest, Organizations
(lien direct)
Ransomware Threat ★★★
knowbe4.webp 2024-01-30 14:00:00 CyberheistNews Vol 14 # 05 Myth de la violation de données massive Éteinte: les gros titres masquent une menace mineure
CyberheistNews Vol 14 #05 Myth of Massive Data Breach Busted: Big Headlines Mask a Minor Threat
(lien direct)

CyberheistNews Vol 14 #05
Data Breach Threat ★★★
knowbe4.webp 2024-01-10 19:52:40 Pikabot malware se propage par les campagnes de phishing
Pikabot Malware Spreading Through Phishing Campaigns
(lien direct)
Malware Threat Prediction ★★
knowbe4.webp 2023-12-26 19:30:56 La menace de l'IA: comment les élections d'Amérique en 2024 pourraient être compromises
The AI Threat: How America\\'s 2024 Election Could Be Compromised
(lien direct)

The AI Threat: How America\'s 2024 Election Could Be Compromised
Threat General Information ★★★
knowbe4.webp 2023-12-08 20:40:05 Presque tous les DSI identifient au moins une cyber-menace comme un risque pour leur entreprise
Nearly Every CIO Identifies at Least One Cyber Threat as a Risk to their Business
(lien direct)

Nearly Every CIO Identifies at Least One Cyber Threat as a Risk to their Business
Threat ★★
knowbe4.webp 2023-11-02 14:20:30 Enquêter avec les e-mails signalés par l'utilisateur avec facilité grâce à la puissante combinaison de CrowdStrike Falcon Sandbox et de Knowbe4 Phisher Plus
Investigate User-Reported Emails with Ease Through the Powerful Combination of CrowdStrike Falcon Sandbox and KnowBe4 PhishER Plus
(lien direct)
Ransomware Malware Threat ★★
knowbe4.webp 2023-10-26 14:30:22 The Role of AI in Email Security and How Real-Time Threat Intelligence Can Supercharge Your SOC Team (lien direct)
The Role of AI in Email Security and How Real-Time Threat Intelligence Can Supercharge Your SOC Team
Threat ★★
knowbe4.webp 2023-10-18 13:14:57 [Mois de sensibilisation à la cybersécurité] Comment arrêter les attaques Ransomwolf: similitudes avec les terreurs de loups-garous
[Cybersecurity Awareness Month] How To Stop the Ransomwolf Attacks: Similarities to the Werewolves Terrors
(lien direct)
Threat ★★
knowbe4.webp 2023-10-10 20:05:50 L'acteur de la triade de la triade saliss
Smishing Triad Threat Actor Sets Its Sights on the UAE
(lien direct)
Smishing Triad jette son objectif sur les EAU Resesecurity avertit que l'acteur de la triade de smirage a «largement élargi son empreinte d'attaque» aux Émirats arabes unis (EAU).
Smishing Triad Sets Its Sights on the UAE Resecurity warns that the Smishing Triad threat actor has “vastly expanded its attack footprint” in the United Arab Emirates (UAE).
Threat APT 15 ★★★
knowbe4.webp 2023-10-06 16:43:38 Le rôle de l'IA dans la sécurité des e-mails et comment les renseignements sur les menaces en temps réel peuvent suralimenter votre équipe SOC
The Role of AI in Email Security and How Real-Time Threat Intelligence Can Supercharge Your SOC Team
(lien direct)

The Role of AI in Email Security and How Real-Time Threat Intelligence Can Supercharge Your SOC Team
Threat ★★★
knowbe4.webp 2023-09-28 13:17:22 Un nouvel acteur de menace imite la Croix-Rouge pour livrer des logiciels malveillants
New Threat Actor Impersonates the Red Cross to Deliver Malware
(lien direct)

New Threat Actor Impersonates the Red Cross to Deliver Malware
Malware Threat ★★
knowbe4.webp 2023-08-16 18:00:17 Ransomware attaque la montée en flèche alors que l'IA génératrice devient un outil de marchandise dans l'arsenal de l'acteur de menace
Ransomware Attacks Surge as Generative AI Becomes a Commodity Tool in the Threat Actor\\'s Arsenal
(lien direct)

Ransomware Attacks Surge as Generative AI Becomes a Commodity Tool in the Threat Actor\'s Arsenal
Ransomware Tool Threat ★★
knowbe4.webp 2023-08-10 18:39:58 Le rôle de l'AI \\ dans la cybersécurité: Black Hat USA 2023 révèle comment les grands modèles de langage façonnent l'avenir des attaques de phishing et de la défense
AI\\'s Role in Cybersecurity: Black Hat USA 2023 Reveals How Large Language Models Are Shaping the Future of Phishing Attacks and Defense
(lien direct)
 Rôle Ai \\ dans la cybersécurité: Black Hat USA 2023 révèle la façon dont les modèles de langue façonnentL'avenir des attaques de phishing et de la défense à Black Hat USA 2023, une session dirigée par une équipe de chercheurs en sécurité, dont Fredrik Heiding, Bruce Schneier, Arun Vishwanath et Jeremy Bernstein, ont dévoilé une expérience intrigante.Ils ont testé de grands modèles de langue (LLM) pour voir comment ils ont fonctionné à la fois dans l'écriture de courriels de phishing convaincants et les détecter.Ceci est le PDF document technique . L'expérience: l'élaboration des e-mails de phishing L'équipe a testé quatre LLM commerciaux, y compris le chatppt de l'Openai \\, Bard de Google \\, Claude \\ de Google et Chatllama, dans des attaques de phishing expérimentales contre les étudiants de Harvard.L'expérience a été conçue pour voir comment la technologie de l'IA pouvait produire des leurres de phishing efficaces. Heriding, chercheur à Harvard, a souligné qu'une telle technologie a déjà eu un impact sur le paysage des menaces en facilitant la création de courriels de phishing.Il a dit: "GPT a changé cela. Vous n'avez pas besoin d'être un orateur anglais natif, vous n'avez pas besoin de faire beaucoup. Vous pouvez entrer une invite rapide avec seulement quelques points de données." L'équipe a envoyé des e-mails de phishing offrant des cartes-cadeaux Starbucks à 112 étudiants, en comparant Chatgpt avec un modèle non AI appelé V-Triad.Les résultats ont montré que l'e-mail V-Triad était le plus efficace, avec un taux de clic de 70%, suivi d'une combinaison V-Triad-Chatgpt à 50%, Chatgpt à 30% et le groupe témoin à 20%. Cependant, dans une autre version du test, Chatgpt a fonctionné beaucoup mieux, avec un taux de clic de près de 50%, tandis que la combinaison V-Triad-Chatgpt a mené avec près de 80%.Heriding a souligné qu'un LLM non formé et à usage général a pu créer rapidement des attaques de phishing très efficaces. Utilisation de LLMS pour la détection de phishing La deuxième partie de l'expérience s'est concentrée sur l'efficacité des LLM pour déterminer l'intention des e-mails suspects.L'équipe a utilisé les e-mails de Starbucks de la première partie de l'expérience et a demandé aux LLM de déterminer l'intention, qu'elle ait été composée par un humain ou une IA, d'identifier tout aspect suspect et d'offrir des conseils sur la façon de répondre. Les résultats étaient à la fois surprenants et encourageants.Les modèles avaient des taux de réussite élevés dans l'identification des e-mails marketing, mais ont eu des difficultés avec l'intention des e-mails de phishing V-Triad et Chatgpt.Ils se sont mieux comportés lorsqu'ils sont chargés d'identifier le contenu suspect, les résultats de Claude \\ étant mis en évidence pour non seulement pour obtenir des résultats élevés dans les tests de détection mais aussi fournir des conseils judicieux pour les utilisateurs. La puissance de phishing de LLMS Dans l'ensemble, Heriding a conclu que les LLMS prêtesété formé sur toutes les données de sécurité.Il a déclaré: "C'est vraiment quelque chose que tout le monde peut utiliser en ce moment. C'est assez puissant." L'expér Tool Threat ChatGPT ChatGPT ★★
knowbe4.webp 2023-07-07 15:00:00 Smartwatch non sollicité gratuit dans le courrier et je suis dans l'armée?Qu'est ce qui pourrait aller mal???
Free Unsolicited Smartwatch in the Mail and I\\'m in the Military? What Could Possibly Go Wrong???
(lien direct)
Threat ★★
knowbe4.webp 2023-07-06 12:00:00 Nerve Center: Protégez votre réseau contre les nouvelles souches de ransomware avec notre dernière mise à jour RANSIM
Nerve Center: Protect Your Network Against New Ransomware Strains with Our Latest RanSim Update
(lien direct)
simulateur de ransomware gratuit ransomware continue d'être une menace majeure pour toutes les organisations et, selon le Verizon 2023 Data Breach Investigations Report , est toujours présent dans 24% des violations.
Free Ransomware Simulator Ransomware continues to be a major threat for all organizations and, according to the Verizon 2023 Data Breach Investigations Report, is still present in 24% of breaches.
Ransomware Data Breach Threat ★★
knowbe4.webp 2023-07-05 13:00:00 Cyberheistnews Vol 13 # 27 [tête haute] La campagne de phishing d'identité massive imite plus de 100 marques et des milliers de domaines
CyberheistNews Vol 13 #27 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains
(lien direct)
CyberheistNews Vol 13 #27 CyberheistNews Vol 13 #27  |   July 5th, 2023 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains A year-long phishing campaign has been uncovered that impersonates 100+ popular clothing, footwear, and apparel brands using at least 10 fake domains impersonating each brand. We\'ve seen plenty of attacks that impersonated a single brand along with a few domains used to ensure victims can be taken to a website that seeks to harvest credentials or steal personal information. But I don\'t think an attack of such magnitude as the one identified by security researchers at Internet security monitoring vendor Bolster. According to Bolster, the 13-month long campaign used over 3000 live domains (and another 3000+ domains that are no longer in use) to impersonate over 100 well-known brands. We\'re talking about brands like Nike, Guess, Fossil, Tommy Hilfiger, Skechers, and many more. Some of the domains have even existed long enough to be displayed at the top of natural search results. And these sites are very well made; so much so that they mimic their legitimate counterparts enough that visitors are completing online shopping visits, providing credit card and other payment details. The impersonation seen in this widespread attack can just as easily be used to target corporate users with brands utilized by employees; all that\'s needed is to put the time and effort into building out a legitimate enough looking impersonated website and create a means to get the right users to visit said site (something most often accomplished through phishing attacks). This latest impersonation campaign makes the case for ensuring users are vigilant when interacting with the web – something accomplished through continual Security Awareness Training. Blog post with links:https://blog.knowbe4.com/massive-impersonation-phishing-campaign [Live Demo] Ridiculously Easy Security Awareness Training and Phishing Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense. Join us Wednesday, July 12, @ 2:00 PM (ET), for a live demonstra Malware Hack Threat Cloud ★★
knowbe4.webp 2023-06-29 17:18:11 Acteur de menace iranienne Chichette Chichette à l'aide de la campagne de phishing de lance pour distribuer des logiciels malveillants
Iranian Threat Actor Charming Kitten Using Spear Phishing Campaign To Distribute Malware
(lien direct)
Malware Threat APT 35 ★★
knowbe4.webp 2023-06-27 13:00:00 Cyberheistnews Vol 13 # 26 [Eyes Open] La FTC révèle les cinq dernières escroqueries par SMS
CyberheistNews Vol 13 #26 [Eyes Open] The FTC Reveals the Latest Top Five Text Message Scams
(lien direct)
CyberheistNews Vol 13 #26 CyberheistNews Vol 13 #26  |   June 27th, 2023 [Eyes Open] The FTC Reveals the Latest Top Five Text Message Scams The U.S. Federal Trade Commission (FTC) has published a data spotlight outlining the most common text message scams. Phony bank fraud prevention alerts were the most common type of text scam last year. "Reports about texts impersonating banks are up nearly tenfold since 2019 with median reported individual losses of $3,000 last year," the report says. These are the top five text scams reported by the FTC: Copycat bank fraud prevention alerts Bogus "gifts" that can cost you Fake package delivery problems Phony job offers Not-really-from-Amazon security alerts "People get a text supposedly from a bank asking them to call a number ASAP about suspicious activity or to reply YES or NO to verify whether a transaction was authorized. If they reply, they\'ll get a call from a phony \'fraud department\' claiming they want to \'help get your money back.\' What they really want to do is make unauthorized transfers. "What\'s more, they may ask for personal information like Social Security numbers, setting people up for possible identity theft." Fake gift card offers took second place, followed by phony package delivery problems. "Scammers understand how our shopping habits have changed and have updated their sleazy tactics accordingly," the FTC says. "People may get a text pretending to be from the U.S. Postal Service, FedEx, or UPS claiming there\'s a problem with a delivery. "The text links to a convincing-looking – but utterly bogus – website that asks for a credit card number to cover a small \'redelivery fee.\'" Scammers also target job seekers with bogus job offers in an attempt to steal their money and personal information. "With workplaces in transition, some scammers are using texts to perpetrate old-school forms of fraud – for example, fake \'mystery shopper\' jobs or bogus money-making offers for driving around with cars wrapped in ads," the report says. "Other texts target people who post their resumes on employment websites. They claim to offer jobs and even send job seekers checks, usually with instructions to send some of the money to a different address for materials, training, or the like. By the time the check bounces, the person\'s money – and the phony \'employer\' – are long gone." Finally, scammers impersonate Amazon and send fake security alerts to trick victims into sending money. "People may get what looks like a message from \'Amazon,\' asking to verify a big-ticket order they didn\'t place," the FTC says. "Concerned Ransomware Spam Malware Hack Tool Threat FedEx APT 28 APT 15 ChatGPT ChatGPT ★★
knowbe4.webp 2023-06-20 13:00:00 Cyberheistnews Vol 13 # 25 [empreintes digitales partout] Les informations d'identification volées sont la cause profonde n ° 1 des violations de données
CyberheistNews Vol 13 #25 [Fingerprints All Over] Stolen Credentials Are the No. 1 Root Cause of Data Breaches
(lien direct)
CyberheistNews Vol 13 #25 CyberheistNews Vol 13 #25  |   June 20th, 2023 [Fingerprints All Over] Stolen Credentials Are the No. 1 Root Cause of Data Breaches Verizon\'s DBIR always has a lot of information to unpack, so I\'ll continue my review by covering how stolen credentials play a role in attacks. This year\'s Data Breach Investigations Report has nearly 1 million incidents in their data set, making it the most statistically relevant set of report data anywhere. So, what does the report say about the most common threat actions that are involved in data breaches? Overall, the use of stolen credentials is the overwhelming leader in data breaches, being involved in nearly 45% of breaches – this is more than double the second-place spot of "Other" (which includes a number of types of threat actions) and ransomware, which sits at around 20% of data breaches. According to Verizon, stolen credentials were the "most popular entry point for breaches." As an example, in Basic Web Application Attacks, the use of stolen credentials was involved in 86% of attacks. The prevalence of credential use should come as no surprise, given the number of attacks that have focused on harvesting online credentials to provide access to both cloud platforms and on-premises networks alike. And it\'s the social engineering attacks (whether via phish, vish, SMiSh, or web) where these credentials are compromised - something that can be significantly diminished by engaging users in security awareness training to familiarize them with common techniques and examples of attacks, so when they come across an attack set on stealing credentials, the user avoids becoming a victim. Blog post with links:https://blog.knowbe4.com/stolen-credentials-top-breach-threat [New PhishER Feature] Immediately Add User-Reported Email Threats to Your M365 Blocklist Now there\'s a super easy way to keep malicious emails away from all your users through the power of the KnowBe4 PhishER platform! The new PhishER Blocklist feature lets you use reported messages to prevent future malicious email with the same sender, URL or attachment from reaching other users. Now you can create a unique list of blocklist entries and dramatically improve your Microsoft 365 email filters without ever l Ransomware Data Breach Spam Malware Hack Vulnerability Threat Cloud ChatGPT ChatGPT ★★
knowbe4.webp 2023-06-13 13:00:00 CyberheistNews Vol 13 # 24 [Le biais de l'esprit \\] le prétexage dépasse désormais le phishing dans les attaques d'ingénierie sociale
CyberheistNews Vol 13 #24 [The Mind\\'s Bias] Pretexting Now Tops Phishing in Social Engineering Attacks
(lien direct)
CyberheistNews Vol 13 #24 CyberheistNews Vol 13 #24  |   June 13th, 2023 [The Mind\'s Bias] Pretexting Now Tops Phishing in Social Engineering Attacks The New Verizon DBIR is a treasure trove of data. As we will cover a bit below, Verizon reported that 74% of data breaches Involve the "Human Element," so people are one of the most common factors contributing to successful data breaches. Let\'s drill down a bit more in the social engineering section. They explained: "Now, who has received an email or a direct message on social media from a friend or family member who desperately needs money? Probably fewer of you. This is social engineering (pretexting specifically) and it takes more skill. "The most convincing social engineers can get into your head and convince you that someone you love is in danger. They use information they have learned about you and your loved ones to trick you into believing the message is truly from someone you know, and they use this invented scenario to play on your emotions and create a sense of urgency. The DBIR Figure 35 shows that Pretexting is now more prevalent than Phishing in Social Engineering incidents. However, when we look at confirmed breaches, Phishing is still on top." A social attack known as BEC, or business email compromise, can be quite intricate. In this type of attack, the perpetrator uses existing email communications and information to deceive the recipient into carrying out a seemingly ordinary task, like changing a vendor\'s bank account details. But what makes this attack dangerous is that the new bank account provided belongs to the attacker. As a result, any payments the recipient makes to that account will simply disappear. BEC Attacks Have Nearly Doubled It can be difficult to spot these attacks as the attackers do a lot of preparation beforehand. They may create a domain doppelganger that looks almost identical to the real one and modify the signature block to show their own number instead of the legitimate vendor. Attackers can make many subtle changes to trick their targets, especially if they are receiving many similar legitimate requests. This could be one reason why BEC attacks have nearly doubled across the DBIR entire incident dataset, as shown in Figure 36, and now make up over 50% of incidents in this category. Financially Motivated External Attackers Double Down on Social Engineering Timely detection and response is crucial when dealing with social engineering attacks, as well as most other attacks. Figure 38 shows a steady increase in the median cost of BECs since 2018, now averaging around $50,000, emphasizing the significance of quick detection. However, unlike the times we live in, this section isn\'t all doom and Spam Malware Vulnerability Threat Patching Uber APT 37 ChatGPT ChatGPT APT 43 ★★
knowbe4.webp 2023-06-06 13:00:00 Cyberheistnews Vol 13 # 23 [réveil] Il est temps de se concentrer davantage sur la prévention du phishing de lance
CyberheistNews Vol 13 #23 [Wake-Up Call] It\\'s Time to Focus More on Preventing Spear Phishing
(lien direct)
CyberheistNews Vol 13 #23 CyberheistNews Vol 13 #23  |   June 6th, 2023 [Wake-Up Call] It\'s Time to Focus More on Preventing Spear Phishing Fighting spear phishing attacks is the single best thing you can do to prevent breaches. Social engineering is involved in 70% to 90% of successful compromises. It is the number one way that all hackers and malware compromise devices and networks. No other initial root cause comes close (unpatched software and firmware is a distant second being involved in about 33% of attacks). A new, HUGE, very important, fact has been gleaned by Barracuda Networks which should impact the way that EVERYONE does security awareness training. Everyone needs to know about this fact and react accordingly. This is that fact: "...spear phishing attacks that use personalized messages... make up only 0.1% of all email-based attacks according to Barracuda\'s data but are responsible for 66% of all breaches." Let that sink in for a moment. What exactly is spear phishing? Spear phishing is when a social engineering attacker uses personal or confidential information they have learned about a potential victim or organization in order to more readily fool the victim into performing a harmful action. Within that definition, spear phishing can be accomplished in thousands of different ways, ranging from basic attacks to more advanced, longer-range attacks. [CONTINUED] at KnowBe4 blog:https://blog.knowbe4.com/wake-up-call-its-time-to-focus-more-on-preventing-spear-phishing [Live Demo] Ridiculously Easy Security Awareness Training and Phishing Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense. Join us TOMORROW, Wednesday, June 7, @ 2:00 PM (ET), for a live demonstration of how KnowBe4 introduces a new-school approach to security awareness training and simulated phishing. Get a look at THREE NEW FEATURES and see how easy it is to train and phish your users. NEW! Executive Reports - Can create, tailor and deliver advanced executive-level reports NEW! KnowBe4 Ransomware Malware Hack Tool Threat ★★
knowbe4.webp 2023-06-05 14:00:28 Être un professionnel certifié de sensibilisation à la sécurité et de la culture (SACP) ™
Be a Certified Security Awareness and Culture Professional (SACP)™
(lien direct)
Threat ★★★
Last update at: 2025-05-11 20:07:39
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter