You are here

Cybersecurity

Security Awareness – Threat Actors Abusing Microsoft Edge News Feed Ads for Tech Support Scams

Threat actors are exploiting Microsoft Edge’s News Feed to conduct a malvertising campaign by injecting online advertisements and redirecting potential victims to websites pushing tech support scams, according to security researchers at Malwarebytes. This campaign has been ongoing for at least two months and is currently one of the most extensive operations based on the amount of telemetry noise.

Security Awareness – Threat Actors Exploiting Death of Queen Elizabeth to Steal Credentials and MFA Codes

Threat actors are exploiting the death of Queen Elizabeth II in brand impersonation phishing attacks to steal victims’ Microsoft account credentials, according to security researchers at Proofpoint. The phishing email purports to be from Microsoft and invites recipients to an “artificial technology hub” in the Queen’s honor. The social engineering tactic includes baiting the recipient to open the link so they can sign an online memory board in honor of the Queen.

Cyber Resilience – Australian Cyber Security Centre Releases Updated Information Security Manual

The Australian Cyber Security Centre (ACSC) recently released an updated version of its Information Security Manual (ISM). The purpose of the ISM is to outline a cybersecurity framework that organizations can apply, using a risk management framework to protect information and systems from cyber threats. The ISM is intended for both executives and network defenders.

Joint Cybersecurity Advisory – Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations

Yesterday, the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, the National Security Agency (NSA), U.S. Cyber Command Cyber National Mission Force, the U.S. Department of the Treasury, the Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), and the United Kingdom’s National Cyber Security Centre (NCSC) published a joint Cybersecurity Advisory (CSA) to highlight continued malicious cyber activity by advanced persistent threat (APT) actors affiliated with the Iranian Government’s Islamic Revolutionary Guard Corps (IRGC).

Threat Awareness – BEC and VEC and MPI (Multi-Persona Impersonation), Oh My!

Business email compromise (BEC) and vendor email compromise (VEC) are accurately and often discussed as impersonation-style cyber attacks where threat actors purport to be someone we have an existing trust relationship with. The intent of this ruse is to give phishing ploys a level of credibility to increase the chance of success. Some impersonation-style attacks are little more than amateurs attempting to spoof a trusted sender.

Threat Awareness – Microsoft Teams GIFs can be exploited for GIFShell Attacks

Threat Actors could exploit GIFs in Microsoft Teams to conduct phishing attacks, exfiltrate data, bypass security controls, and perform command execution via a novel attack technique dubbed “GIFShell.” The new attack technique chains together multiple security vulnerabilities in Microsoft Teams to compromise potential victims.

Pages

Subscribe to Cybersecurity