Tag: phishing

Three things to know about banking trojans

Three things to know about banking trojans

The failures of three large banks earlier this year sent shockwaves through the public. A banking crisis makes (almost) everyone nervous, which in turn creates new opportunities for social engineering, phishing, and other attacks designed to get your money. One attack we...

/ July 3, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: “File Archiver in the Browser” exploits

Cybersecurity Threat Advisory: “File Archiver in the Browser” exploits

A new skilled and clever “File Archiver in the Browser” phishing trick that utilizes ZIP domains has surfaced. Bad actors can employ this technique to deceive users into downloading malicious files, compromise systems, and potentially gaining unauthorized access. What is...

/ June 7, 2023
Report: 2023 spear-phishing trends

Report: 2023 spear-phishing trends

Cybercriminals continue to barrage organizations with targeted spear-phishing attacks, and many companies are struggling to keep up. In fact, Barracuda market research finds that 50% of surveyed organizations were victims of spear phishing in 2022 — and 24% had at least...

/ May 24, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New phishing campaigns

Cybersecurity Threat Advisory: New phishing campaigns

Cybercriminals have started new phishing campaigns that targets organizations and individuals who were members of affected banks. Fraudulent messages are being sent in an attempt to trick victims into revealing personal/account information such as social security numbers, passwords, and account...

/ March 15, 2023
Phishing
Tech Time Warp: FTC Takes First Action Against Phishing

Tech Time Warp: FTC Takes First Action Against Phishing

“See Yourself in Cyber” is the theme of the 2022 Cybersecurity Awareness Month, encouraging computer users to recognize their own power to detect and protect themselves from cybercrime. Few of us can say that we’ve never been tripped up by...

/ October 21, 2022
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Phishing attacks targeting GitHub accounts

Cybersecurity Threat Advisory: Phishing attacks targeting GitHub accounts

GitHub alerted the public that there is an ongoing phishing campaign that is targeting its users by impersonating CircleCI continuous integration and delivery platform. These phishing attacks are designed to steal the targeted user’s account credentials and authentication codes. A...

/ September 26, 2022
Identity theft and identity fraud: What they are and how to fight back

Identity theft and identity fraud: What they are and how to fight back

The United States Department of Justice (DOJ) does not spell out any distinction between identity theft and identity fraud, saying only that they: “…are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s...

/ September 12, 2022
Partner Spotlight: How one MSP reduced phishing-related calls by 20 percent

Partner Spotlight: How one MSP reduced phishing-related calls by 20 percent

Based in Toronto, Tuor Networks is an IT managed services provider (MSP) serving customers nationally across Canada. The company provides comprehensive solutions in IT infrastructure, cloud, and outsourced IT managed services to small, medium and large businesses across a variety...

/ February 2, 2022
Tech Time Warp: Gone phishing for cybersecurity history

Tech Time Warp: Gone phishing for cybersecurity history

The theme for Week 2 of Cybersecurity Awareness Month is “Phight the Phish!” Arguably one of the most insidious forms of cybercrime, phishing relies on tricking a recipient via social engineering into handing over personal information—and sometimes installing malware in...

/ October 15, 2021
How hackers use phishing in ransomware attacks

How hackers use phishing in ransomware attacks

Phishing attacks work because people like to click on things. Hackers carefully tailor attacks to their victims by collecting publicly available personal information about them and playing to their sense of urgency to get a response. The attackers only need...

/ October 12, 2021 / 1 Comment