CISA Analysis Reveals Successful Attack Techniques of FY 2020
The analysis shows potential attack paths and the most effective techniques for each tactic documented in CISA's Risk and Vulnerability Assessments.The Department of Homeland Cybersecurity and Infrastructure Security Agency...
Intl. Law Enforcement Operation Takes Down DoubleVPN
The VPN service allegedly provided a means for cybercriminals to target their victims, Europol officials report.A coordinated international law enforcement operation has seized the Web domains and server infrastructure...
12 cybersecurity startups to watch
If you want to know what’s new in cybersecurity, watch what the startup vendors are doing. They typically begin with an innovative idea and are unfettered by an installed...
LogoKit Simplifies Office 365, SharePoint ‘Login’ Phishing Pages
A phishing kit has been found running on at least 700 domains – and mimicking services via false SharePoint, OneDrive and Office 365 login portals.
A newly-uncovered phishing kit, dubbed...
2020 was the year of phishing
A new report shows a staggering 34.4% increase in phishing attacks in the last year.2020 was a bad year to be someone susceptible to phishing attacks, a massive collection...
A phishing campaign’s collateral damage: Stolen passwords were publicly searchable
Written by Joe Warminsky Jan 21, 2021 |...
How Dangerous Is Malware? New Report Finds It’s Tough to Tell
Determining which malware is most damaging, and worthy of immediate attention, has become difficult in environments filled with alerts and noise.Malware continues to challenge security teams, but those challenges...
25 bogus Google Play store apps promised to mine cryptocurrency for a fee, scamming...
Written by Tonya Riley Jul 7, 2021 |...