Tag Archives: phishing

Phishing: how to detect one of the subtlest online threats

Phishing: how to detect one of the subtlest online threats

Phishing is one the subtlest threats in the dark world of cyber threats. The world has been witnessing a surge in phishing attacks since the outbreak of the pandemic. It may be extremely disruptive and carry big security problems, but there are several ways to mitigate this threat. With a caveat: enhancing your cybersecurity through software  is essential, but it is not a silver bullet. Indeed, much depends on users’ behavior and threat actors know that. Let’s explore how, then! How to avoid phishing: identifying threats Scammers have increased their sophistication to induce victims into trap. Phishing emails and text messages may look like they’re from a company you know […]

COVID-19 vaccine: beware of phishing

COVID-19 vaccine: beware of phishing

Have you received a strange e-mail about COVID-19, offering you various solutions to buy an under-the-counter vaccine currently in distribution? Think twice before clicking on any link. In addition to trying to sell fake Covid-19 drugs and vaccines, hackers are using the latest news as bait for their phishing campaigns. Threat intelligence analysts have warned that cybercriminals are taking advantage of developments on the COVID vaccine distribution campaign to give rise to insidious malspam campaigns. The threats What threats are we talking about? These phishing campaigns contain a myriad of malicious files. We have singled out: .EXE with the name “Download_Covid 19 New approved vaccines.23.07.2020.exe” which, once clicked, will install […]

The guy who hacked Twitter: “Kirk” and the human factor

The guy who hacked Twitter: “Kirk” and the human factor

It was a 17-year-old hacker who managed to persuade some Twitter employees that he was a collaborator of the technology department who needed the credentials to log into the customer support portal. Resident of Tampa, Florida, Graham Ivan Clark – known by the pseudonym Kirk – is defined by investigators as a teenager out of the ordinary. The story Having obtained the passwords, “Kirk” was able to enter the Twitter computer system. The intrusion involved access to hundreds of VIP profiles including Barack Obama and Bill Gates, but also Jeff Bezos, Mike Bloomberg, Warren Buffet, Wiz Khalifa, Floyd Mayweather, Elon Musk, and Kanye West. Kirk’s goal was to publish fake […]

Twitter attack: the three lessons to learn

Twitter attack: the three lessons to learn

The recent cyber-attack that hit Twitter has created a lot of media sensation, especially because it is the first time that one of the great global social media platforms has been compromised in such a vast and blatant way. Beyond the economic and image damage produced by the attack, this event must push us to make some broader considerations, starting from the implications for cybersecurity and privacy, up to the role that certain social networks have now assumed in the sphere of social and political life. The dynamics of the attack On July 15, 2020, between 8:00 PM and 10:00 PM UTC, several Twitter accounts of celebrities, each with millions […]

Ransomware: a threat to the present and the future

Ransomware: a threat to the present and the future

Ransomware has become an increasingly prominent threat to cyberspace security globally and the recent statistical data collected would seem to confirm this trend also for the years to come. What is ransomware and how it works The term “ransomware” refers to a type of malware that limits access to the device it infects, requiring a ransom to be paid to remove the limitation. Some forms of ransomware, for example, block the system and order the user to pay to unlock it, whereas others encrypt the user’s files instead, asking the user to pay a sum to make the files readable again. There are of course many variations of ransomware, but […]

A new campaign of phishing attacks to steal personal data reported

A new campaign of phishing attacks to steal personal data reported

A few days ago, on the 27th of March, industry reporting signalled a new campaign of Covid-19/ coronavirus-themed spear phishing attacks that illegitimately uses the WHO (World Health Organization) mark, to spread another variant of the info-stealer Lokibot, in order to steal personal data and confidential information from the victims of the attack. This is not the first time that this particular malware has appeared, in fact numerous versions, all derived from the original source code, have already been identified. The most disparate methods were also used for what concerns the means of distribution. This spear phishing campaign has already spread rapidly in different parts of the world, especially in […]

Communication cyber threats landscape

Communication cyber threats landscape

In the new evolving communication landscape, cyber threats do not just target things, objects, or devices. First and foremost, cyberattacks target people and leverage on user’s and programmer’s psychology. On the one side, users are often the practical means by which an attack hits the mark: cybercriminals leverage on the lack of security knowledge and on the speed at which our society moves to infiltrate a system and to damage both network infrastructures and our everyday environment. Sending fraudulent emails, stealing credentials, uploading malicious attachments to applications are just some of the most common ways of exploiting human interactions with technologies to execute an attack. On the other side, even […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close