dcsimg

Phishing Email Uses Google Drive to Get Past Microsoft Security

This week, Threatpost reported on a new spear-phishing attack that uses email sent via Google Drive claiming to be the CEO of the targeted company sharing important information with the recipients.  The email came from Google Drive, but the sender address didn’t match the company’s standard naming convention for email addresses. Because the message was sent by a legitimate email … [Read more...]

A week in security (August 5 – 11)

Last week on Malwarebytes Labs, we explained how brain-machine interface (BMI) technology could usher in a world of Internet of Thoughts, why having backdoors is problematic, and how we can improve the security of our smart homes. To cap off Hacker Summer Camp week, the Labs team released a special ransomware edition of its quarterly cybercrime tactics and techniques report, which you can … [Read more...]

How to get your Equifax money and stay safe doing it

Following the enormous data breach of Equifax in 2017—in which roughly 147 million Americans’ suffered the loss of their Social Security numbers, addresses, credit card and driver’s license information, birthdates, and more—the company has agreed to a settlement with the US Federal Trade Commission, in which it will pay at least $650 million. Much of that settlement—up to $425 million—is … [Read more...]

Microsoft OneNote audio note phishing scam

Phishing is a constant threat for organisations and individuals alike. The scam, which involves sending emails that masquerade as legitimate organisations to fraudulently obtain sensitive information, targets hundreds of millions of organisations and people daily.   Microsoft OneNote users are the latest target of a phishing scam. An email entitled “New Audio Note Received” is purportedly sent … [Read more...]

A week in security (July 8 – 14)

Last week on Malwarebytes Labs, we looked at ways to send your sensitive information in a secure fashion, examined some tactics in incident response land, and explored federal data privacy law. We also looked at how security tools can turn against you, and took a deep dive into the rather fiendish Soft Cell attack. Other cybersecurity news The UK government backs facial recognition tech: The … [Read more...]

The 5 most common types of phishing attack

Phishing is one of the most frustrating threats we face. Most of know what it is and how it works, but we still get caught out.  The scam, which involves criminals sending messages that masquerade as legitimate organisations, targets hundreds of millions of organisations every day. The messages direct recipients to a bogus website that captures their personal information or contain a malicious … [Read more...]

Social engineering is becoming cyber criminals’ weapon of choice

The cyber security industry has traditionally focused on technological weaknesses, but according to the 2019 Trustwave Global Security Report, the majority of breaches begin with social engineering.    What is social engineering?  Social engineering is a method of psychological manipulation in which a trickster persuades someone to perform certain actions or divulge sensitive … [Read more...]

A week in security (June 17 – 23)

Last week on the Malwarebytes Labs blog, we took a look at the growing pains of smart cities, took a deep dive into AI, jammed along to Radiohead, and looked at the lessons learned from Chernobyl in relation to critical infrastructure. We also explored a new Steam phish attack, and pulled apart a Mac cryptominer. Other cybersecurity news Florida City falls to ransomware: Riviera Beach City … [Read more...]