Over 75% of cyber attacks start with someone opening a malicious email. These emails are designed to extract data from the recipient, usually a password, which is used to gain further access to an organization’s network. Once an account takeover has been successful, hackers are able to mount more sophisticated attacks.
From “Global Banking & Finance Review” (1/19/2022)
In a hurry to park your car? Don’t want to fumble around in your pocket to find cash for the parking meter, and don’t have the correct payment app installed on your phone?Well, think carefully before rushing to scan the payment QR code stuck on the side of the meter – it may well be an attempt by fraudsters to phish your financial information.
From “Bit Defender” Graham Cluley (1/05/2022)
To help with taking inventory, tools like asset discovery scanning and automated vulnerability scanning can be used. Furthermore, other good housekeeping measures involve reviewing your change management procedures, running a report on administrator accounts, verifying firewall rules, and validating VPN accounts.
From “Supply Chain Digest” Leon Allen (12/09/2021)
Security researchers say they have seen a “massive wave” of malicious hackers exploiting the comment feature in Google Docs to spread malicious content into the inboxes of unsuspecting targeted users.
From “The State of Security” Graham Cluley (1/07/2022)