Tag: Threat Spotlight

QR code phishing
Threat Spotlight: The evolving use of QR codes in phishing attacks

Threat Spotlight: The evolving use of QR codes in phishing attacks

QR code phishing, also known as quishing, is a type of social engineering attack. Cybercriminals try to trick victims into using the camera on their mobile phone to scan a QR code that goes to a malicious website to steal sensitive...

/ October 22, 2024
ransomware threat
Threat Spotlight: How ransomware for rent rules the threat landscape

Threat Spotlight: How ransomware for rent rules the threat landscape

This year’s annual review of ransomware attacks looks at the threat from two perspectives. First, for the third year running we’ve taken a global sample of reported ransomware attacks and analyzed what they tell us about ransomware attackers and their...

/ August 21, 2024
Threat Spotlight: The remote desktop tools most targeted by attackers in the last year

Threat Spotlight: The remote desktop tools most targeted by attackers in the last year

Remote desktop software allows employees to connect into their computer network without being physically linked to the host device or even in the same location. This makes it a useful tool for a distributed or remote workforce. Unfortunately, remote desktop...

/ May 1, 2024
Threat spotlight
Threat Spotlight: Web apps under active threat from 10-year-old Shellshock bugs and miners

Threat Spotlight: Web apps under active threat from 10-year-old Shellshock bugs and miners

The Shellshock bugs — there are six related CVE designations — have the highest severity rating of 10. They exist in the Unix Bash shell, which is the default command-line interface on all Linux, Unix, and Mac-based operating systems. If...

/ March 7, 2024
Threat Spotlight: How attackers are targeting your web applications right now

Threat Spotlight: How attackers are targeting your web applications right now

The number of attacks targeting web applications and application programming interfaces (APIs) has increased significantly. Barracuda mitigated more than 18 billion attacks against applications during 2023, including 1.716 billion in December alone. Web applications are computer programs that are accessed...

/ February 7, 2024
Threat Spotlight: Phishing emails using Adobe InDesign on the rise

Threat Spotlight: Phishing emails using Adobe InDesign on the rise

Barracuda security researchers are warning of a recent surge in phishing attacks leveraging Adobe InDesign, a known and trusted document publishing system. Some of the attacks are targeted. According to Barracuda telemetry, there has been a near 30-fold increase since October in...

/ December 4, 2023
Threat Spotlight: How attackers use inbox rules to evade detection after compromise

Threat Spotlight: How attackers use inbox rules to evade detection after compromise

Automated email inbox rules are a useful and familiar feature of most email clients. They help people manage their inboxes and the daily flood of wanted and unwanted communications by enabling them to move emails to specific folders, forward them...

/ September 20, 2023
Barracuda XDR Insights: How AI learns your patterns to protect you

Barracuda XDR Insights: How AI learns your patterns to protect you

In the first half of 2023, Barracuda Managed XDR collected almost a trillion customer IT events, among which it detected and neutralized thousands of high-risk incidents. During those six months, the most widely encountered high-risk incidents — threats that require...

/ August 23, 2023
Threat Spotlight: Reported ransomware attacks double as AI tactics take hold

Threat Spotlight: Reported ransomware attacks double as AI tactics take hold

In 2023, artificial intelligence and generative AI have dominated headlines, and their impact is starting to make its mark on ransomware attacks ― for example with AI-enhanced phishing attacks to gain access to target networks and AI-powered automation for greater reach. Over...

/ August 2, 2023
Threat Spotlight: Extortion attacks

Threat Spotlight: Extortion attacks

Extortion attacks, which are an increasingly common form of email scams, threaten the victim with compromising information, such as an embarrassing photo, and request payment in a cryptocurrency to prevent the information from being released. Attackers often purchase victims’ login...

/ July 12, 2023