Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2025-04-22 13:01:39 |
Les acteurs de la menace abusent de plus en plus des outils d'IA pour aider avec les escroqueries Threat Actors Are Increasingly Abusing AI Tools to Help With Scams (lien direct) |
|
Tool
Threat
|
|
★★★
|
 |
2025-03-27 21:07:44 |
Rapport: le phishing reste la cyber-menace la plus répandue Report: Phishing Remains the Most Prevalent Cyber Threat (lien direct) |
|
Threat
|
|
★★★
|
 |
2025-03-20 14:28:47 |
Les principaux plats à retenir du rapport Knowbe4 2025 Rapport de menaces de phishing Key Takeaways from the KnowBe4 2025 Phishing Threat Trends Report (lien direct) |
Notre dernier Rapport des tendances de la menace de phishing href = "https://www.knowbe4.com/resource-center/phishing"> phishing paysage en 2025, des tactiques renouvelées aux techniques d'attaque émergentes.
Our latest Phishing Threat Trends Report explores the evolving phishing landscape in 2025, from renewed tactics to emerging attack techniques. |
Threat
|
|
★★★
|
 |
2025-03-07 14:13:54 |
Facture ou usurpation d'identité? 36,5% de pic dans les attaques de phishing tirant parti de QuickBooks \\ 'Domaine légitime en 2025 Invoice or Impersonation? 36.5% Spike in Phishing Attacks Leveraging QuickBooks\\' Legitimate Domain in 2025 (lien direct) |
|
Threat
|
|
★★
|
 |
2025-03-05 14:11:50 |
[Tête haute] L'attaque de phishing sophistiquée utilise un nouvel astuce d'obscuscations JavaScript [Heads Up] Sophisticated Phishing Attack Uses New JavaScript Obfuscation Trick (lien direct) |
|
Threat
|
|
★★★
|
 |
2025-02-20 17:54:32 |
Spear Phishing is the Top Cyber Threat to the Manufacturing Sector (lien direct) |
Spear phishing was the top cybersecurity threat to the manufacturing sector over the past six months, according to a report from ReliaQuest. These attacks accounted for 41% of true-positive alerts in the sector.
Spear phishing was the top cybersecurity threat to the manufacturing sector over the past six months, according to a report from ReliaQuest. These attacks accounted for 41% of true-positive alerts in the sector. |
Threat
|
|
★★★
|
 |
2025-01-15 15:34:45 |
Japan Attributes More Than 200 Cyberattacks to China Threat Actor "MirrorFace" (lien direct) |
Japan\'s National Police Agency (NPA) has attributed more than 200 cyber incidents over the past five years to the China-aligned threat actor “MirrorFace,” Infosecurity Magazine reports.
Japan\'s National Police Agency (NPA) has attributed more than 200 cyber incidents over the past five years to the China-aligned threat actor “MirrorFace,” Infosecurity Magazine reports. |
Threat
Legislation
|
|
★★
|
 |
2024-11-20 15:40:54 |
Threat Actors are Sending Malicious QR Codes Via Snail Mail (lien direct) |
|
Threat
|
|
★★
|
 |
2024-11-13 20:08:32 |
Criminal Threat Actor Uses Stolen Invoices to Distribute Malware (lien direct) |
|
Malware
Threat
|
|
★★
|
 |
2024-08-19 12:34:46 |
Ransomware Group connu sous le nom de \\ 'royal \\' se renforce comme noire et tire parti de nouvelles méthodes d'attaque Ransomware Group Known as \\'Royal\\' Rebrands as BlackSuit and Is Leveraging New Attack Methods (lien direct) |
Le groupe de menaces de ransomware anciennement connu sous le nom de "Royal" s'est rebaptisé comme noir et a mis à jour ses méthodes d'attaque, prévient le FBI.
The ransomware threat group formerly known as "Royal" has rebranded itself as BlackSuit and updated their attack methods, warns the FBI. |
Ransomware
Threat
|
|
★★★
|
 |
2024-08-12 21:15:08 |
Histoires de pirate: une menace physique Facebook Hacker Stories: A Facebook Physical Threat (lien direct) |
|
Threat
|
|
★★★
|
 |
2024-07-30 17:47:32 |
Les organisations se préparent à des cyberattaques plus évoluées basées sur l'IA à mesure que Deepfakes deviennent les principales préoccupations Organizations Prepare for More Evolved AI-Based Cyber Attacks as Deepfakes Become Top Concern (lien direct) |
|
Threat
|
|
★★★
|
 |
2024-07-18 17:41:32 |
Cyber Menaces ciblant les Jeux olympiques de Paris 2024 Cyber Threats Targeting the 2024 Paris Olympics (lien direct) |
Nos amis du Cyberwire ont rapporté: "Zerofox et Fortinet ont tous deux publié des rapports sur les menaces auxquelles sont confrontés les Jeux olympiques de 2024 à Paris. Zerofox & nbsp; dit & nbsp; La principale menace de cybersécurité sera des cyberattaques à partir de cyberattaques deLa Russie, qui est «susceptible de prendre la forme d'attaques DDOS, de compromis de données et d'escroqueries menées par les groupes d'acteurs de menace russe».
Our friends at the CyberWire reported: "ZeroFox and Fortinet have both published reports on threats facing the 2024 Olympics in Paris. ZeroFox says the primary cybersecurity threat will be cyberattacks from Russia, which are "likely to take the form of DDoS attacks, data compromises, and scams carried out by Russian threat actor groups." |
Threat
|
|
★★★
|
 |
2024-07-17 17:50:47 |
Le nouveau groupe de menaces de ransomware appelle les victimes d'attaque pour assurer les paiements New Ransomware Threat Group Calls Attack Victims to Ensure Payments (lien direct) |
|
Ransomware
Threat
|
|
★★★
|
 |
2024-07-16 15:40:00 |
Les groupes de menaces intentionnelles d'espionnage utilisent désormais les ransomwares comme tactique de détournement dans les cyberattaques Espionage-Intent Threat Groups Are Now Using Ransomware as a Diversion Tactic in Cyberattacks (lien direct) |
|
Ransomware
Threat
|
|
★★★
|
 |
2024-07-05 18:00:10 |
Les campagnes de phishing parrainées par l'État ciblent 40 000 personnes VIP State-Sponsored Phishing Campaigns Target 40,000 VIP Individuals (lien direct) |
|
Threat
Medical
Cloud
|
|
★★★
|
 |
2024-06-18 17:58:40 |
Entités brésiliennes de plus en plus ciblées par les attaques de phishing de l'État-nation Brazilian Entities Increasingly Targeted by Nation-State Phishing Attacks (lien direct) |
Phishing provient d'acteurs de menace basés en Chine, en Corée du Nord et en Russie.
Mandiant has published a report looking at cyber threats targeting Brazil, finding that more than 85% of government-backed phishing activity comes from threat actors based in China, North Korea and Russia. |
Threat
|
|
★★★
|
 |
2024-06-06 12:27:15 |
«Opération Endgame» se termine par l'arrestation de 4 suspects cybercriminaux et 100 serveurs “Operation Endgame” Ends with the Arrest of 4 Cybercriminal Suspects and 100 Servers (lien direct) |
Les efforts coordonnés entre les agences d'application de la loi dans neuf pays ont entraîné une perturbation majeure des logiciels malveillants d'un groupe de menaces et ransomware opérations.
Coordinated efforts between law enforcement agencies across nine countries has resulted in a major disruption of a threat group\'s malware and ransomware operations. |
Malware
Threat
Legislation
|
|
★★
|
 |
2024-05-29 18:42:27 |
Menage acteur void Manticore utilise des «essuie-glaces» de cyber-armes pour détruire les données et les systèmes Threat Actor Void Manticore Uses Cyber Weapon “Wipers” to Destroy Data and Systems (lien direct) |
|
Threat
|
|
★★
|
 |
2024-05-20 18:55:38 |
Un nouveau rapport sur les menaces conclut que près de 90% des cybermenaces impliquent l'ingénierie sociale New Threat Report Finds Nearly 90% of Cyber Threats Involve Social Engineering (lien direct) |
|
Threat
Studies
|
|
★★★
|
 |
2024-05-01 17:57:24 |
Les acteurs de la menace nord-coréenne ciblent les développeurs de logiciels avec des entretiens d'embauche de faux North Korean Threat Actors Target Software Developers With Phony Job Interviews (lien direct) |
|
Threat
|
|
★★
|
 |
2024-04-11 12:19:04 |
Installations d'eau compromises par les acteurs de la menace iranienne Water Facilities Compromised By Iranian Threat Actors (lien direct) |
>
En décembre 2023, un joint Alerte a été publié par le FBI, la CISA, la NSA, l'EPA et l'incd concernant les cyber-acteurs iraniens appelés" cyberav3ngers "liés à l'Iran \\ ''S Islamic Revolutionary Guard Corps (IRGC).
In December 2023, a joint alert was issued by the FBI, CISA, NSA, EPA, and INCD regarding Iranian cyber actors known as "CyberAv3ngers" linked to Iran\'s Islamic Revolutionary Guard Corps (IRGC). |
Threat
|
|
★★★
|
 |
2024-04-03 16:36:17 |
Le nouveau rapport montre que les liens de phishing et les attachements malveillants sont les principaux points d'entrée des cyberattaques New Report Shows Phishing Links and Malicious Attachments Are The Top Entry Points of Cyber Attacks (lien direct) |
Les nouvelles données d'attaque TTP couvrant 2023 mettent en lumière les acteurs de la menace et les actions des utilisateurs qui mettent les organisations les plus à risque.
New TTP attack data covering 2023 sheds much needed light on the threat actor and user actions that are putting organizations at the most risk. |
Threat
Studies
|
|
★★★
|
 |
2024-03-29 16:07:32 |
Narwhal Spider Threat Group derrière une nouvelle campagne de phishing usurpant l'identité de cabinets d'avocats réputés Narwhal Spider Threat Group Behind New Phishing Campaign Impersonating Reputable Law Firms (lien direct) |
|
Threat
|
|
★★
|
 |
2024-03-25 12:00:00 |
Les cyberattaques conscientes du nuage augmentent 110% alors que les groupes de menaces aiguisent leurs compétences d'attaque Cloud-Conscious Cyber Attacks Spike 110% as Threat Groups Sharpen their Attack Skills (lien direct) |
Les nouvelles données montrent une expertise accrue dans la mise en œuvre et l'exploitation des environnements cloud.
New data shows increased expertise in leveraging and exploiting cloud environments. |
Threat
Cloud
|
|
★★★
|
 |
2024-03-19 17:18:05 |
Phishing Tops 2023 \\'s la plus courante de la méthode d'accès à l'accès Phishing Tops 2023\\'s Most Common Cyber Attack Initial Access Method (lien direct) |
La nouvelle analyse montre que la combinaison de phishing , des e-mails, un accès à distance et des comptes compromis sont au centre de la plupart des acteurs de la menace.
New analysis shows that the combination of phishing, email, remote access, and compromised accounts are the focus for most threat actors. |
Threat
|
|
★★
|
 |
2024-02-23 14:02:47 |
Près d'une cyberattaque sur trois en 2023 a impliqué l'abus de comptes valides Nearly One in Three Cyber Attacks In 2023 Involved The Abuse of Valid Accounts (lien direct) |
Trente pour cent de tous les cyber-incidents en 2023 impliquaient des abus de références valides, selon le dernier indice de renseignement sur les menaces d'IBM X-Force.Cela représente une augmentation de soixante et onze pour cent par rapport à 2022.
Thirty percent of all cyber incidents in 2023 involved abuse of valid credentials, according to IBM X-Force\'s latest Threat Intelligence Index. This represents a seventy-one percent increase compared to 2022. |
Threat
Studies
|
|
★★★
|
 |
2024-02-14 13:57:40 |
AI dans le cyberespace: une épée à double tranchant AI in Cyberspace: A Double-Edged Sword (lien direct) |
|
Ransomware
Threat
|
|
★★★
|
 |
2024-01-31 18:52:23 |
Les paiements de ransomware sur le déclin alors que les cyberattaquants se concentrent sur les organisations les plus petites et les plus grandes Ransomware Payments On The Decline As Cyber Attackers Focus on The Smallest, And Largest, Organizations (lien direct) |
|
Ransomware
Threat
|
|
★★★
|
 |
2024-01-30 14:00:00 |
CyberheistNews Vol 14 # 05 Myth de la violation de données massive Éteinte: les gros titres masquent une menace mineure CyberheistNews Vol 14 #05 Myth of Massive Data Breach Busted: Big Headlines Mask a Minor Threat (lien direct) |
|
Data Breach
Threat
|
|
★★★
|
 |
2024-01-10 19:52:40 |
Pikabot malware se propage par les campagnes de phishing Pikabot Malware Spreading Through Phishing Campaigns (lien direct) |
|
Malware
Threat
Prediction
|
|
★★
|
 |
2023-12-26 19:30:56 |
La menace de l'IA: comment les élections d'Amérique en 2024 pourraient être compromises The AI Threat: How America\\'s 2024 Election Could Be Compromised (lien direct) |
|
Threat
General Information
|
|
★★★
|
 |
2023-12-08 20:40:05 |
Presque tous les DSI identifient au moins une cyber-menace comme un risque pour leur entreprise Nearly Every CIO Identifies at Least One Cyber Threat as a Risk to their Business (lien direct) |
|
Threat
|
|
★★
|
 |
2023-11-02 14:20:30 |
Enquêter avec les e-mails signalés par l'utilisateur avec facilité grâce à la puissante combinaison de CrowdStrike Falcon Sandbox et de Knowbe4 Phisher Plus Investigate User-Reported Emails with Ease Through the Powerful Combination of CrowdStrike Falcon Sandbox and KnowBe4 PhishER Plus (lien direct) |
|
Ransomware
Malware
Threat
|
|
★★
|
 |
2023-10-26 14:30:22 |
The Role of AI in Email Security and How Real-Time Threat Intelligence Can Supercharge Your SOC Team (lien direct) |
|
Threat
|
|
★★
|
 |
2023-10-18 13:14:57 |
[Mois de sensibilisation à la cybersécurité] Comment arrêter les attaques Ransomwolf: similitudes avec les terreurs de loups-garous [Cybersecurity Awareness Month] How To Stop the Ransomwolf Attacks: Similarities to the Werewolves Terrors (lien direct) |
|
Threat
|
|
★★
|
 |
2023-10-10 20:05:50 |
L'acteur de la triade de la triade saliss Smishing Triad Threat Actor Sets Its Sights on the UAE (lien direct) |
Resesecurity avertit que l'acteur de la triade de smirage a «largement élargi son empreinte d'attaque» aux Émirats arabes unis (EAU).
Resecurity warns that the Smishing Triad threat actor has “vastly expanded its attack footprint” in the United Arab Emirates (UAE). |
Threat
|
APT 15
|
★★★
|
 |
2023-10-06 16:43:38 |
Le rôle de l'IA dans la sécurité des e-mails et comment les renseignements sur les menaces en temps réel peuvent suralimenter votre équipe SOC The Role of AI in Email Security and How Real-Time Threat Intelligence Can Supercharge Your SOC Team (lien direct) |
|
Threat
|
|
★★★
|
 |
2023-09-28 13:17:22 |
Un nouvel acteur de menace imite la Croix-Rouge pour livrer des logiciels malveillants New Threat Actor Impersonates the Red Cross to Deliver Malware (lien direct) |
|
Malware
Threat
|
|
★★
|
 |
2023-08-16 18:00:17 |
Ransomware attaque la montée en flèche alors que l'IA génératrice devient un outil de marchandise dans l'arsenal de l'acteur de menace Ransomware Attacks Surge as Generative AI Becomes a Commodity Tool in the Threat Actor\\'s Arsenal (lien direct) |
|
Ransomware
Tool
Threat
|
|
★★
|
 |
2023-08-10 18:39:58 |
Le rôle de l'AI \\ dans la cybersécurité: Black Hat USA 2023 révèle comment les grands modèles de langage façonnent l'avenir des attaques de phishing et de la défense AI\\'s Role in Cybersecurity: Black Hat USA 2023 Reveals How Large Language Models Are Shaping the Future of Phishing Attacks and Defense (lien direct) |
à Black Hat USA 2023, une session dirigée par une équipe de chercheurs en sécurité, dont Fredrik Heiding, Bruce Schneier, Arun Vishwanath et Jeremy Bernstein, ont dévoilé une expérience intrigante.Ils ont testé de grands modèles de langue (LLM) pour voir comment ils ont fonctionné à la fois dans l'écriture de courriels de phishing convaincants et les détecter.Ceci est le PDF document technique . L'expérience: l'élaboration des e-mails de phishing L'équipe a testé quatre LLM commerciaux, y compris le chatppt de l'Openai \\, Bard de Google \\, Claude \\ de Google et Chatllama, dans des attaques de phishing expérimentales contre les étudiants de Harvard.L'expérience a été conçue pour voir comment la technologie de l'IA pouvait produire des leurres de phishing efficaces. Heriding, chercheur à Harvard, a souligné qu'une telle technologie a déjà eu un impact sur le paysage des menaces en facilitant la création de courriels de phishing.Il a dit: "GPT a changé cela. Vous n'avez pas besoin d'être un orateur anglais natif, vous n'avez pas besoin de faire beaucoup. Vous pouvez entrer une invite rapide avec seulement quelques points de données." L'équipe a envoyé des e-mails de phishing offrant des cartes-cadeaux Starbucks à 112 étudiants, en comparant Chatgpt avec un modèle non AI appelé V-Triad.Les résultats ont montré que l'e-mail V-Triad était le plus efficace, avec un taux de clic de 70%, suivi d'une combinaison V-Triad-Chatgpt à 50%, Chatgpt à 30% et le groupe témoin à 20%. Cependant, dans une autre version du test, Chatgpt a fonctionné beaucoup mieux, avec un taux de clic de près de 50%, tandis que la combinaison V-Triad-Chatgpt a mené avec près de 80%.Heriding a souligné qu'un LLM non formé et à usage général a pu créer rapidement des attaques de phishing très efficaces. Utilisation de LLMS pour la détection de phishing La deuxième partie de l'expérience s'est concentrée sur l'efficacité des LLM pour déterminer l'intention des e-mails suspects.L'équipe a utilisé les e-mails de Starbucks de la première partie de l'expérience et a demandé aux LLM de déterminer l'intention, qu'elle ait été composée par un humain ou une IA, d'identifier tout aspect suspect et d'offrir des conseils sur la façon de répondre. Les résultats étaient à la fois surprenants et encourageants.Les modèles avaient des taux de réussite élevés dans l'identification des e-mails marketing, mais ont eu des difficultés avec l'intention des e-mails de phishing V-Triad et Chatgpt.Ils se sont mieux comportés lorsqu'ils sont chargés d'identifier le contenu suspect, les résultats de Claude \\ étant mis en évidence pour non seulement pour obtenir des résultats élevés dans les tests de détection mais aussi fournir des conseils judicieux pour les utilisateurs. La puissance de phishing de LLMS Dans l'ensemble, Heriding a conclu que les LLMS prêtesété formé sur toutes les données de sécurité.Il a déclaré: "C'est vraiment quelque chose que tout le monde peut utiliser en ce moment. C'est assez puissant." L'expér |
Tool
Threat
|
ChatGPT
ChatGPT
|
★★
|
 |
2023-07-07 15:00:00 |
Smartwatch non sollicité gratuit dans le courrier et je suis dans l'armée?Qu'est ce qui pourrait aller mal??? Free Unsolicited Smartwatch in the Mail and I\\'m in the Military? What Could Possibly Go Wrong??? (lien direct) |
|
Threat
|
|
★★
|
 |
2023-07-06 12:00:00 |
Nerve Center: Protégez votre réseau contre les nouvelles souches de ransomware avec notre dernière mise à jour RANSIM Nerve Center: Protect Your Network Against New Ransomware Strains with Our Latest RanSim Update (lien direct) |
ransomware continue d'être une menace majeure pour toutes les organisations et, selon le Verizon 2023 Data Breach Investigations Report , est toujours présent dans 24% des violations.
Ransomware continues to be a major threat for all organizations and, according to the Verizon 2023 Data Breach Investigations Report, is still present in 24% of breaches. |
Ransomware
Data Breach
Threat
|
|
★★
|
 |
2023-07-05 13:00:00 |
Cyberheistnews Vol 13 # 27 [tête haute] La campagne de phishing d'identité massive imite plus de 100 marques et des milliers de domaines CyberheistNews Vol 13 #27 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains (lien direct) |
CyberheistNews Vol 13 #27 | July 5th, 2023
[Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains
A year-long phishing campaign has been uncovered that impersonates 100+ popular clothing, footwear, and apparel brands using at least 10 fake domains impersonating each brand.
We\'ve seen plenty of attacks that impersonated a single brand along with a few domains used to ensure victims can be taken to a website that seeks to harvest credentials or steal personal information. But I don\'t think an attack of such magnitude as the one identified by security researchers at Internet security monitoring vendor Bolster.
According to Bolster, the 13-month long campaign used over 3000 live domains (and another 3000+ domains that are no longer in use) to impersonate over 100 well-known brands. We\'re talking about brands like Nike, Guess, Fossil, Tommy Hilfiger, Skechers, and many more. Some of the domains have even existed long enough to be displayed at the top of natural search results.
And these sites are very well made; so much so that they mimic their legitimate counterparts enough that visitors are completing online shopping visits, providing credit card and other payment details.
The impersonation seen in this widespread attack can just as easily be used to target corporate users with brands utilized by employees; all that\'s needed is to put the time and effort into building out a legitimate enough looking impersonated website and create a means to get the right users to visit said site (something most often accomplished through phishing attacks).
This latest impersonation campaign makes the case for ensuring users are vigilant when interacting with the web – something accomplished through continual Security Awareness Training.
Blog post with links:https://blog.knowbe4.com/massive-impersonation-phishing-campaign
[Live Demo] Ridiculously Easy Security Awareness Training and Phishing
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense.
Join us Wednesday, July 12, @ 2:00 PM (ET), for a live demonstra |
Malware
Hack
Threat
Cloud
|
|
★★
|
 |
2023-06-29 17:18:11 |
Acteur de menace iranienne Chichette Chichette à l'aide de la campagne de phishing de lance pour distribuer des logiciels malveillants Iranian Threat Actor Charming Kitten Using Spear Phishing Campaign To Distribute Malware (lien direct) |
|
Malware
Threat
|
APT 35
|
★★
|
 |
2023-06-27 13:00:00 |
Cyberheistnews Vol 13 # 26 [Eyes Open] La FTC révèle les cinq dernières escroqueries par SMS CyberheistNews Vol 13 #26 [Eyes Open] The FTC Reveals the Latest Top Five Text Message Scams (lien direct) |
CyberheistNews Vol 13 #26 | June 27th, 2023
[Eyes Open] The FTC Reveals the Latest Top Five Text Message Scams
The U.S. Federal Trade Commission (FTC) has published a data spotlight outlining the most common text message scams. Phony bank fraud prevention alerts were the most common type of text scam last year. "Reports about texts impersonating banks are up nearly tenfold since 2019 with median reported individual losses of $3,000 last year," the report says.
These are the top five text scams reported by the FTC:
Copycat bank fraud prevention alerts
Bogus "gifts" that can cost you
Fake package delivery problems
Phony job offers
Not-really-from-Amazon security alerts
"People get a text supposedly from a bank asking them to call a number ASAP about suspicious activity or to reply YES or NO to verify whether a transaction was authorized. If they reply, they\'ll get a call from a phony \'fraud department\' claiming they want to \'help get your money back.\' What they really want to do is make unauthorized transfers.
"What\'s more, they may ask for personal information like Social Security numbers, setting people up for possible identity theft."
Fake gift card offers took second place, followed by phony package delivery problems. "Scammers understand how our shopping habits have changed and have updated their sleazy tactics accordingly," the FTC says. "People may get a text pretending to be from the U.S. Postal Service, FedEx, or UPS claiming there\'s a problem with a delivery.
"The text links to a convincing-looking – but utterly bogus – website that asks for a credit card number to cover a small \'redelivery fee.\'"
Scammers also target job seekers with bogus job offers in an attempt to steal their money and personal information. "With workplaces in transition, some scammers are using texts to perpetrate old-school forms of fraud – for example, fake \'mystery shopper\' jobs or bogus money-making offers for driving around with cars wrapped in ads," the report says.
"Other texts target people who post their resumes on employment websites. They claim to offer jobs and even send job seekers checks, usually with instructions to send some of the money to a different address for materials, training, or the like. By the time the check bounces, the person\'s money – and the phony \'employer\' – are long gone."
Finally, scammers impersonate Amazon and send fake security alerts to trick victims into sending money. "People may get what looks like a message from \'Amazon,\' asking to verify a big-ticket order they didn\'t place," the FTC says. "Concerned |
Ransomware
Spam
Malware
Hack
Tool
Threat
|
FedEx
APT 28
APT 15
ChatGPT
ChatGPT
|
★★
|
 |
2023-06-20 13:00:00 |
Cyberheistnews Vol 13 # 25 [empreintes digitales partout] Les informations d'identification volées sont la cause profonde n ° 1 des violations de données CyberheistNews Vol 13 #25 [Fingerprints All Over] Stolen Credentials Are the No. 1 Root Cause of Data Breaches (lien direct) |
CyberheistNews Vol 13 #25 | June 20th, 2023
[Fingerprints All Over] Stolen Credentials Are the No. 1 Root Cause of Data Breaches
Verizon\'s DBIR always has a lot of information to unpack, so I\'ll continue my review by covering how stolen credentials play a role in attacks.
This year\'s Data Breach Investigations Report has nearly 1 million incidents in their data set, making it the most statistically relevant set of report data anywhere.
So, what does the report say about the most common threat actions that are involved in data breaches? Overall, the use of stolen credentials is the overwhelming leader in data breaches, being involved in nearly 45% of breaches – this is more than double the second-place spot of "Other" (which includes a number of types of threat actions) and ransomware, which sits at around 20% of data breaches.
According to Verizon, stolen credentials were the "most popular entry point for breaches." As an example, in Basic Web Application Attacks, the use of stolen credentials was involved in 86% of attacks. The prevalence of credential use should come as no surprise, given the number of attacks that have focused on harvesting online credentials to provide access to both cloud platforms and on-premises networks alike.
And it\'s the social engineering attacks (whether via phish, vish, SMiSh, or web) where these credentials are compromised - something that can be significantly diminished by engaging users in security awareness training to familiarize them with common techniques and examples of attacks, so when they come across an attack set on stealing credentials, the user avoids becoming a victim.
Blog post with links:https://blog.knowbe4.com/stolen-credentials-top-breach-threat
[New PhishER Feature] Immediately Add User-Reported Email Threats to Your M365 Blocklist
Now there\'s a super easy way to keep malicious emails away from all your users through the power of the KnowBe4 PhishER platform!
The new PhishER Blocklist feature lets you use reported messages to prevent future malicious email with the same sender, URL or attachment from reaching other users. Now you can create a unique list of blocklist entries and dramatically improve your Microsoft 365 email filters without ever l |
Ransomware
Data Breach
Spam
Malware
Hack
Vulnerability
Threat
Cloud
|
ChatGPT
ChatGPT
|
★★
|
 |
2023-06-13 13:00:00 |
CyberheistNews Vol 13 # 24 [Le biais de l'esprit \\] le prétexage dépasse désormais le phishing dans les attaques d'ingénierie sociale CyberheistNews Vol 13 #24 [The Mind\\'s Bias] Pretexting Now Tops Phishing in Social Engineering Attacks (lien direct) |
CyberheistNews Vol 13 #24 | June 13th, 2023
[The Mind\'s Bias] Pretexting Now Tops Phishing in Social Engineering Attacks
The New Verizon DBIR is a treasure trove of data. As we will cover a bit below, Verizon reported that 74% of data breaches Involve the "Human Element," so people are one of the most common factors contributing to successful data breaches. Let\'s drill down a bit more in the social engineering section.
They explained: "Now, who has received an email or a direct message on social media from a friend or family member who desperately needs money? Probably fewer of you. This is social engineering (pretexting specifically) and it takes more skill.
"The most convincing social engineers can get into your head and convince you that someone you love is in danger. They use information they have learned about you and your loved ones to trick you into believing the message is truly from someone you know, and they use this invented scenario to play on your emotions and create a sense of urgency. The DBIR Figure 35 shows that Pretexting is now more prevalent than Phishing in Social Engineering incidents. However, when we look at confirmed breaches, Phishing is still on top."
A social attack known as BEC, or business email compromise, can be quite intricate. In this type of attack, the perpetrator uses existing email communications and information to deceive the recipient into carrying out a seemingly ordinary task, like changing a vendor\'s bank account details. But what makes this attack dangerous is that the new bank account provided belongs to the attacker. As a result, any payments the recipient makes to that account will simply disappear.
BEC Attacks Have Nearly Doubled
It can be difficult to spot these attacks as the attackers do a lot of preparation beforehand. They may create a domain doppelganger that looks almost identical to the real one and modify the signature block to show their own number instead of the legitimate vendor.
Attackers can make many subtle changes to trick their targets, especially if they are receiving many similar legitimate requests. This could be one reason why BEC attacks have nearly doubled across the DBIR entire incident dataset, as shown in Figure 36, and now make up over 50% of incidents in this category.
Financially Motivated External Attackers Double Down on Social Engineering
Timely detection and response is crucial when dealing with social engineering attacks, as well as most other attacks. Figure 38 shows a steady increase in the median cost of BECs since 2018, now averaging around $50,000, emphasizing the significance of quick detection.
However, unlike the times we live in, this section isn\'t all doom and |
Spam
Malware
Vulnerability
Threat
Patching
|
Uber
APT 37
ChatGPT
ChatGPT
APT 43
|
★★
|
 |
2023-06-06 13:00:00 |
Cyberheistnews Vol 13 # 23 [réveil] Il est temps de se concentrer davantage sur la prévention du phishing de lance CyberheistNews Vol 13 #23 [Wake-Up Call] It\\'s Time to Focus More on Preventing Spear Phishing (lien direct) |
CyberheistNews Vol 13 #23 | June 6th, 2023
[Wake-Up Call] It\'s Time to Focus More on Preventing Spear Phishing
Fighting spear phishing attacks is the single best thing you can do to prevent breaches. Social engineering is involved in 70% to 90% of successful compromises. It is the number one way that all hackers and malware compromise devices and networks. No other initial root cause comes close (unpatched software and firmware is a distant second being involved in about 33% of attacks).
A new, HUGE, very important, fact has been gleaned by Barracuda Networks which should impact the way that EVERYONE does security awareness training. Everyone needs to know about this fact and react accordingly.
This is that fact: "...spear phishing attacks that use personalized messages... make up only 0.1% of all email-based attacks according to Barracuda\'s data but are responsible for 66% of all breaches."
Let that sink in for a moment.
What exactly is spear phishing? Spear phishing is when a social engineering attacker uses personal or confidential information they have learned about a potential victim or organization in order to more readily fool the victim into performing a harmful action. Within that definition, spear phishing can be accomplished in thousands of different ways, ranging from basic attacks to more advanced, longer-range attacks.
[CONTINUED] at KnowBe4 blog:https://blog.knowbe4.com/wake-up-call-its-time-to-focus-more-on-preventing-spear-phishing
[Live Demo] Ridiculously Easy Security Awareness Training and Phishing
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense.
Join us TOMORROW, Wednesday, June 7, @ 2:00 PM (ET), for a live demonstration of how KnowBe4 introduces a new-school approach to security awareness training and simulated phishing.
Get a look at THREE NEW FEATURES and see how easy it is to train and phish your users.
NEW! Executive Reports - Can create, tailor and deliver advanced executive-level reports
NEW! KnowBe4 |
Ransomware
Malware
Hack
Tool
Threat
|
|
★★
|
 |
2023-06-05 14:00:28 |
Être un professionnel certifié de sensibilisation à la sécurité et de la culture (SACP) ™ Be a Certified Security Awareness and Culture Professional (SACP)™ (lien direct) |
|
Threat
|
|
★★★
|