News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Perfidious cyber attacks on hotels
SophosNews

Criminals are increasingly exploiting the well-meaning service spirit of hotel employees: Sophos X-Ops has uncovered several cases of a “malspam” campaign targeting hotels around the world. Access comes via phishing and also threatens the guests' data. The attacks using the RedLine Stealer malware, which specializes in skimming access data, have currently been detected in Spain, France, Germany, Switzerland, the United Arab Emirates and the USA. Phishing through fake complaints... The attackers first report with complaints about serious problems that the sender supposedly has with...

Read more

Phishing: Extremely high number of malicious emails with Adobe InDesign links
B2B Cyber ​​Security ShortNews

A new phishing scam is on the rise that abuses Adobe InDesign and uses it to distribute malicious links. Apparently the campaign was so successful that Barracuda saw an increase in said phishing emails from 75 to 2.000 per day. Phishing attacks are becoming increasingly sophisticated, using various methods to evade detection and trap victims. There is currently an increase in phishing attacks that abuse Adobe InDesign, a well-known and trusted document publishing system. Increase by a factor of 30: Phishing with Adobe InDesign links According to Barracuda telemetry, the…

Read more

Cyberattacks 2024: New attack tactics
Cyberattacks 2024: New attack tactics

Constantly changing, new attack tactics and techniques to specifically exploit human weaknesses will challenge IT security managers in 2024. IT security professionals are facing another challenging year. Cybercriminals are constantly refining their attack tactics, techniques and procedures (TTPs), demonstrating their ability to rapidly evolve and implement new, complex attack chains. At the heart of this development is a crucial shift: cybercriminals are targeting digital identities rather than technical vulnerabilities. Even though TTPs and goals change, one aspect remains constant: people and their identities are the most...

Read more

Phishing kits are evolving
B2B Cyber ​​Security ShortNews

The ongoing evolution of phishing kits, commonly known as “scamas,” reveals a worrying dynamic where even beginners have the opportunity to become highly skilled fraudsters. This fascinating development is reflected not only in the increasingly sophisticated features of these kits, but also in their clever marketing within the dark web. It becomes clear that the technological sophistication of these fraudulent tools extends not only to their range of functionality, but also to how cleverly they are promoted and distributed in the shadows of the Dark Web. According to Vade Secure’s findings…

Read more

Phishing attacks are becoming more sophisticated
Phishing attacks are becoming more sophisticated

Phishing attacks have become a serious threat in today's digital era. A study from GetApp not only looks at the increasing frequency and impact of such attacks, but also takes a look at how well managers are prepared for this threat and what measures they are taking. The focus of the study is on the experiences of managers in Germany who have experienced at least one phishing attack. When asked how worrying phishing attacks are, 23% of executives see serious risks. The majority (87%) of respondents believe that…

Read more

Phishing via Google
B2B Cyber ​​Security ShortNews

Over the last few months, hackers have repeatedly been observed exploiting the online services of well-known hyperscalers such as Google to make phishing emails appear legitimate. The abused services included PayPal, Microsoft SharePoint, AWS, Facebook Ads and various Google services such as Google Looker, Google Collection and Google Ads. With Google Groups, CPR has now identified another application from the global tech company that is being used for phishing spoofs. From the perspective of hackers, Google tools are particularly inviting for data theft because Google services are free and easy to use. Google also has a variety of tools:…

Read more

Increased QR code attacks via email
Increased QR code attacks via email

Check Point security researchers are observing a new type of phishing attack that uses a dangerous QR code. The new “quishing” is becoming more and more prevalent as many users scan the codes without hesitation. The new variant of phishing with QR codes is becoming increasingly popular: quishing or QR code phishing. The actually harmless QR codes are ideal for disguising malicious intentions. A common QR code image can hide a malicious link, which is hardly visible. Since users are used to QR codes, such a code in an email is often not recognized as a threat. Out of…

Read more

Cyber ​​Threats: New Tactics and Trends
Cyber ​​Threats: New Tactics and Trends

Remote access to company networks is increasing and with it cyber threats are increasing. Cybercriminals are constantly developing their attack tactics. As companies' internal cybersecurity becomes more protected and monitored, cybercriminals have evolved their tactics and are focusing on new methods of compromise that provide a larger attack surface than ever before. This means organizations must look beyond their traditional IT boundaries to understand the full scope of threats that could lead to a cyber incident. External threats To better understand this expanded attack landscape, continuous...

Read more

Phishing Report Q3: Dangerous personnel emails in trend 
Phishing Report Q3: Dangerous personnel emails in trend

KnowBe3's Q2023 4 global phishing report finds that HR-related email topics continue to be used as a phishing strategy, accounting for more than 50 percent of top email topics. The report shows clear. dangerous trends. The results of KnowBe2023's third quarter 4 phishing report show clear attack trends. They include the most clicked email topics in phishing tests and reflect the use of business-related HR messages as well as popular seasonal messages that can pique employees' interest and influence their workday. Phishing emails – old but dangerous Phishing emails are still one of the…

Read more

Third-party phishing more efficient than phishing
Third-party phishing more efficient than phishing

Third-party phishing, a tactic that directs victims to fake phishing pages run by a trusted brand, is increasing significantly. Global financial institutions are particularly targeted by attackers. A new, dangerous trend. Phishing has always posed a huge threat to businesses. What is particularly worrying is that attackers are constantly finding new ways to develop sophisticated attack methods that are able to bypass various cybersecurity protocols. In the first half of 2023, BlueVoyant's cyber threat analysis experts began investigating an attack technique they first identified in 2020, which...

Read more