News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Europol Report 2023 on Crime-as-a-Service

Europol has investigated many areas of cybercrime and produced an interesting report, which, however, only highlights individual areas. The so-called Spotlight Report will be presented as part of IOCTA 2023 – Internet Organized Crime Threat Assessmen. The Spotlight report, “Cyberattacks: the pinnacle of crime-as-a-service,” examines developments in cyberattacks and discusses new methods and threats observed by Europol’s operational analysts. It also explains the types of criminal structures behind cyberattacks and how these increasingly professionalized groups are exploiting changes in geopolitics as part of their methods. This…

Read more

ZeroFont phishing: Emails with text in 0 point font size
B2B Cyber ​​Security ShortNews

Hackers use the ZeroFont phishing trick: using 0-point size fonts in emails to make malicious emails appear as if they were securely scanned by security tools in Microsoft Outlook. Phishing emails that contain fonts with a size of 0 point are not entirely new. While the so-called ZeroFont phishing technique has been used in the past, this is the first time it has been documented in this way. ISC Sans analyst Jan Kopriva warns that this trick could make a massive difference in the effectiveness of phishing operations and users…

Read more

Whaling: AI-supported attacks on the big fish!
Whaling: AI-supported attacks on the big fish! - Image by istvangyal on Pixabay

The attackers try to catch the big fish in the company: In cybersecurity, this is called “whaling”. AI-powered whaling attacks threaten CEOs, lawmakers and the military. “Harpoon Whaling” is the refined method with VIP service. “Whaling” is about catching big fish. The targets of cybercriminals are executives of successful companies, high-ranking officials and military personnel. It's about stealing information or siphoning off large sums of money. The Harpoon Whaling in particular - a subspecies of Whaling - is perfidious because the attackers automatically collect extensive information about their victims and organize it using nested…

Read more

Jailbreaking AI-based chatbots
B2B Cyber ​​Security ShortNews

The cybersecurity company behind the exposure of WormGPT has published a blog post. This provides information about the strategies used by cybercriminals who “jailbreak” popular AI chatbots like ChatGPT. This refers to tactics that circumvent the security limits that companies impose on their chatbots. SlashNext researchers have found that cybercriminals don't just share their successful jailbreaks on discussion forums to make them accessible to others. Instead, developers are also promoting AI bots that can be used for criminal purposes. They claim these are custom language models (LLMs). SlashNext has confirmed that this is in…

Read more

Use data and AI to thwart phishing attacks
Use data and AI to thwart phishing attacks

A new product leverages insights from more than 10 million trained users worldwide to identify, block and remove phishing emails before they reach users' inboxes. KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, announces the launch of its newest product, PhishER Plus. The tool leverages insights based on data from the world's largest group of users trained to recognize and report real phishing attacks. The product also powers a new global threat feed from KnowBe4. The triple...

Read more

NodeStealer 2.0 hijacks Facebook business accounts
B2B Cyber ​​Security ShortNews

Unit 42 researchers recently uncovered a previously unreported phishing campaign that distributed an infostealer capable of completely taking over Facebook business accounts. Facebook business accounts were attacked with a phishing lure that offered tools such as business spreadsheet templates. This is part of a growing trend of attacks targeting Facebook business accounts for ad fraud and other purposes. The trend started in July 2022 with the discovery of the info-stealer Ducktail. Phishing targets Facebook business accounts About eight months later, in March 2023, FakeGPT, a new variant of a fake…

Read more

Microsoft discovers Storm-0978 spying phishing
Microsoft discovers Storm-0978 spying phishing

Microsoft has identified a phishing campaign by Russian threat actor Storm-0978 targeting defense and government agencies in Europe and North America. It's about financial data and espionage in the attack. Storm-0978 (DEV-0978; also referred to by other vendors as RomCom, the name of their backdoor) is a Russia-based cybercriminal group known for conducting opportunistic ransomware and extortion operations, as well as credential-targeting attacks. Storm-0978 operates, develops and distributes the RomCom backdoor. The actor also deploys the underground ransomware, which is closely related to the Industrial Spy ransomware, which first appeared in the wild in May 2022…

Read more

The most dangerous attack method: social engineering
The most dangerous attack method: social engineering

According to Verizon's Data Breach Investigations Report, 74% of security breaches are the result of successful social engineering attacks, bugs, abuse, and other human weaknesses. Also in many companies. A little good news: In the previous year, 82 percent of security breaches were recorded. But 74 percent remain social engineering attacks, according to Verizon's Data Breach Investigations report. The most successful attack method with 50 percent is pretexting, i.e. a social engineering activity with a specific pretext as the trigger. This is a double increase compared to last year. Phishing, phishing, phishing pretexting is...

Read more

QR code phishing security test tool
QR code phishing security test tool

KnowBe4 is now offering a complementary QR code phishing security test tool that identifies users who are victims of QR code phishing attacks. The free tool (QR Code PST) helps businesses identify end-users who are particularly vulnerable to scanning malicious QR codes. Many companies are aware of the typical social engineering techniques used by malicious actors. These include phishing, spear phishing and identity theft to manipulate employees and infiltrate systems. Actors have now recognized the popularity of QR codes and are using them for targeted phishing attacks. Targeted QR code phishing attacks QR code phishing is a social engineering attack that uses a…

Read more

Attacks using Web3 IPFS technology
B2B Cyber ​​Security ShortNews

IPFS is a Web3 technology that decentralizes and distributes the storage of files and other data on a peer-to-peer network. Like any technology, IPFS can be misused by cybercriminals. However, since the content hosted on IPFS is decentralized and distributed, it is difficult to find and remove dangerous content from the ecosystem. What are Web3 and IPFS? IPFS is one of the technologies supporting Web3 infrastructures. Web3 – or the third iteration of the web – is a new version of the internet that uses blockchain technology and tokens to achieve decentralization in…

Read more