New phishing tactic exploits DocuSign documents
Imagine that you get an email from DocuSign, which is a reputable and well-known electronic signature platform. If you clicked on the link in the email, you would most likelyRead More →
Imagine that you get an email from DocuSign, which is a reputable and well-known electronic signature platform. If you clicked on the link in the email, you would most likelyRead More →
During the fourth quarter of 2022, Yahoo was the target of twenty percent of all brand phishing attempts. Investigators discovered tactics that involved sending harmful phishing emails posing as YahooRead More →
A sophisticated phishing tool called SquarePhish employs a method that combines QR codes with the OAuth Device code authentication procedure. A malicious QR code email may be sent to aRead More →
Have I Been Pwned is a service used by those who want to verify if the password they use or their email address was exposed as a result of aRead More →
In its most recent edition, Operation First Light 2022, planned by Interpol, led to the identification of various social engineering groups around the world, in addition to the seizure ofRead More →
A worrying number of cybercriminal campaigns occur with no indication of those responsible for these online crimes, especially those with financial motivations. However, in some cases, threat actors leave enoughRead More →
Threat actors could exploit a critical zero-day vulnerability in Windows Search to run remotely hosted malware just by automatically opening a search window with a Word document. According to theRead More →
Researchers at security firm Fortinet report detecting a fraudulent campaign based on the delivery of three pieces of fileless malware with enhanced confidential information-stealing capabilities. The malware is delivered throughRead More →
Researchers from the SafetyDetectives team found an exposed AWS S3 bucket that stored personal details about pilots, flight staff and other employees at Turkish flight company Pegasus Airlines. This bucketRead More →
© 2023 All Rights Reserved
info@iicybersecurity.com