Tag: phishing

Threat Spotlight: How company size affects the email threats targeting your business

Threat Spotlight: How company size affects the email threats targeting your business

It takes less than a minute for someone to fall for a phishing scam. According to the 2024 Data Breach Investigations Report, the median time for a recipient to click on a malicious link after opening the email is 21 seconds, followed by...

/ July 30, 2024
Threat Spotlight: Attackers abuse URL protection services to mask phishing links

Threat Spotlight: Attackers abuse URL protection services to mask phishing links

As defenders tighten their grip on the tools and techniques used in phishing attacks, adversaries are finding new ways to bypass detection and target potential victims. For example, many phishing attacks rely on convincing users to click on a compromised link...

/ July 15, 2024
New report: BEC accounts for 1 in 10 email attacks

New report: BEC accounts for 1 in 10 email attacks

Email-based social engineering threats are thriving as attackers continue to adapt and evolve their tactics to increase their chances of success. The latest analysis of email detection data by Barracuda researchers reveals that while the landscape remains dominated by mass phishing and general scamming attacks, there’s...

/ June 18, 2024
credential theft
5 Ways cybercriminals are using AI: Access and credential theft

5 Ways cybercriminals are using AI: Access and credential theft

Threat actors have embraced artificial intelligence (AI) for phishing, deepfakes, malware generation, content localization, and more. This week we’re looking at how they’re using it for credential theft to gain access to high-value networks. Stolen credentials are a goldmine for cybercriminals, especially if the...

/ June 4, 2024
QR code phishing: What MSPs need to know to protect their customers

QR code phishing: What MSPs need to know to protect their customers

In today’s digital age, the use of technology continuously evolves to make our personal and professional lives more convenient. Quick Response (QR) code has been one such advancement. This two-dimensional barcode allows users to share website URLs and contact information...

/ April 12, 2024
How attackers weaponize generative AI through data poisoning and manipulation

How attackers weaponize generative AI through data poisoning and manipulation

The generative AI models that today power chatbots, online search queries, customer interactions, and more are known as large language models (LLMs). The LLMs are trained on vast volumes of data and then use that data to create more data,...

/ April 8, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: TA558 phishing campaign

Cybersecurity Threat Advisory: TA558 phishing campaign

The threat actor TA558 is conducting a phishing campaign targeting various sectors in Latin America, intending to deploy the remote access tool known as Venom RAT. Barracuda MSP encourages organizations to follow the recommendations detailed in this Cybersecurity Threat Advisory...

/ April 3, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: StrelaStealer malware targets organizations

Cybersecurity Threat Advisory: StrelaStealer malware targets organizations

A new email threat, StrelaStealer malware, is targeting Europe and United States organizations. It spreads through phishing emails with attachments that execute its dynamic-link library (DLL) payload designed to steal email login data. This Cybersecurity Threat Advisory reviews the threat...

/ March 27, 2024
AI
Five ways cybercriminals use AI to wreak havoc

Five ways cybercriminals use AI to wreak havoc

It seems that each time there is a new technology advancement, criminals quickly cut to the front of the line when it comes to dreaming up new applications. That is the case with generative artificial intelligence (AI), which has been...

/ February 29, 2024
email
How to help your clients comply with new Google and Yahoo email requirements

How to help your clients comply with new Google and Yahoo email requirements

When it comes to email security, most of the focus is on what happens when a malicious email is received. Optimally, a multi-layered approach will help filter out phishing emails and other attacks via technology and user training. But some...

/ February 15, 2024