Remove DDOS Remove Phishing Remove Spyware
article thumbnail

Phishers prefer Tesla, top 3 malware strains in Coronavirus phishing campaigns

Security Affairs

Group-IB’s CERT-GIB analyzed hundreds of coronavirus -related phishing emails and discovered top malware strains in COVID-19 campaigns. Group-IB’s Computer Emergency Response Team ( CERT-GIB ) analyzed hundreds of coronavirus-related phishing emails between February 13 and April 1, 2020. Spyware: the most likely COVID-19 payload.

Phishing 141
article thumbnail

Security Affairs newsletter Round 498 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA adds Palo Alto Networks Expedition bugs to its Known Exploited Vulnerabilities catalog Hackers target critical flaw CVE-2024-10914 in EOL D-Link NAS Devices China-linked threat actors compromised multiple telecos and spied on a limited number of U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 512 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA adds SonicWall SonicOS and Palo Alto PAN-OS flaws to its Known Exploited Vulnerabilities catalog Juniper Networks fixed a critical flaw in Session Smart Routers China-linked APT group Winnti targets Japanese organizations since March 2024 Xerox VersaLink C7025 Multifunction printer flaws may expose Windows Active Directory credentials to attackers (..)

Malware 65
article thumbnail

3 ways DNS filtering can save SMBs from cyberattacks

Malwarebytes

Blocks phishing websites. You might recognize this as one example of phishing , an attack where cybercriminals trick potential victims into sharing sensitive information or giving the perpetrator privileged access to a network. Luckily, by blocking the domain names of phishing sites, a DNS filter can nip attacks in the bud.

DNS 98
article thumbnail

IT threat evolution Q1 2022

SecureList

The group uses various malware families, including Wroba, and attack methods that include phishing, mining, smishing and DNS poisoning. Subsequently, DDoS attacks hit some government websites. One of the things you can do to protect yourself from advanced mobile spyware is to reboot your device on a daily basis. Other malware.

Phishing 133
article thumbnail

Security Affairs newsletter Round 445 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Police seized BulletProftLink phishing-as-a-service (PhaaS) platform Serbian pleads guilty to running ‘Monopoly’ dark web drug market McLaren Health Care revealed that a data breach impacted 2.2 Every week the best security articles from Security Affairs are free for you in your email box.

DDOS 127
article thumbnail

Top 9 Cybersecurity Challenges SMEs Currently Face

Responsible Cyber

Phishing and Spear Phishing. Despite constant warnings from the cyber security industry, people still fall victim to phishing every day. As cybercrime has become well-funded and increasingly sophisticated, phishing remains one of the most effective methods used by criminals to introduce malware into businesses.