Emotet Returns to Hit 100K Mailboxes Per Day - Just in time for the Christmas holiday, Emotet is sending the gift of Trickbot. https://threatpost.com/emotet-returns-100k-mailboxes/162584/ #emotetreturns #cyberattacks #websecurity #emailattack #trickbot #malware #malspam #emotet #trojan
Emotet Returns to Hit 100K Mailboxes Per Day

Just in time for the Christmas holiday, Emotet is sending the gift of Trickbot.

Threatpost - English - Global - threatpost.com
Office 365 OAuth Attack Targets Coinbase Users - Attackers are targeting Microsoft Office 365 users with a Coinbase-themed attack, aiming to take c... https://threatpost.com/office-365-oauth-attack-coinbase/160337/ #maliciousoauthapp #accounttakeover #websecurity #emailattack #inboxaccess #consentapp #microsoft #office365 #coinbase #hacks #oauth
Office 365 OAuth Attack Targets Coinbase Users

Attackers are targeting Microsoft Office 365 users with a Coinbase-themed attack, aiming to take control of their inboxes via OAuth.

Threatpost - English - Global - threatpost.com
Office 365 Phishing Attack Leverages Real-Time Active Directory Validation - Attackers check the victims' Office 365 credentials in real time as they are typed into the phishi... https://threatpost.com/office-365-phishing-attack-leverages-real-time-active-directory-validation/159188/ #microsoftactivedirectory #authenticationapi #activedirectory #phishingattack #phishingemail #websecurity #credentials #emailattack #microsoft #office365 #hacks
Office 365 Phishing Attack Leverages Real-Time Active Directory Validation

Attackers check the victims' Office 365 credentials in real time as they are typed into the phishing landing page, by using authentication APIs.

Threatpost - English - Global - threatpost.com
First-Ever Russian BEC Gang, Cosmic Lynx, Uncovered - Researchers warn that Cosmic Lynx targets firms that don't use DMARC and uses a "mergers and acqui... more: https://threatpost.com/russian-bec-gang-cosmic-lynx-uncovered/157166/ #mergersandacquisitionsscam #businessemailcompromise #russianbecgroup #websecurity #cyberattack #emailattack #cosmiclynx #dmarc #fraud #bec
First-Ever Russian BEC Gang, Cosmic Lynx, Uncovered

Researchers warn that Cosmic Lynx targets firms that don't use DMARC and uses a "mergers and acquisitions" pretext that can lead to large sums of money being stolen.

Threatpost - English - Global - threatpost.com
Supreme Court Phish Targets Office 365 Credentials - Cybercriminals are hunting out victims' Office 365 credentials -- by dishing out Supreme court "su... more: https://threatpost.com/supreme-court-phish-targets-office-365-credentials/155955/ #fakecaptchaform #subpoenaphish #supremecourt #websecurity #emailattack #microsoft #office365 #phishing
Supreme Court Phish Targets Office 365 Credentials

Cybercriminals are hunting out victims' Office 365 credentials – by dishing out Supreme court "summons" in a phishing attack.

Threatpost - English - Global - threatpost.com
Scammers target COVID-19 CARES Act relief scheme - US states are being flooded by fraudulent unemployment applications in a scam run by a sophisticat... more: https://nakedsecurity.sophos.com/2020/05/21/scammers-target-covid-19-cares-act-relief-scheme/ #governmentsecurity #securitythreats #benefitpayments #identitytheft #coronavirus #emailattack #law&order #caresact #fraud #bec #pii
Scammers target COVID-19 CARES Act relief scheme

US states are being flooded by fraudulent unemployment applications in a scam run by a sophisticated cybergang.

Naked Security
BEC Gang Exploits G Suite, Long Domain Names in Cyberattacks - BEC gangs like "Exaggerated Lion" are using tricky tactics - like exploiting G Suite - to scam com... more: https://threatpost.com/bec-gang-exploits-g-suite-long-domain-names-in-cyberattacks/155718/ #businessemailcompromise #emailcompromise #emailattack #becattack #phishing #videos #scam #bec
BEC Gang Exploits G Suite, Long Domain Names in Cyberattacks

BEC gangs like "Exaggerated Lion" are using tricky tactics – like exploiting G Suite – to scam companies out of millions.

Threatpost - English - Global - threatpost.com
Microsoft OneNote Used To Sidestep Phishing Detection - A recent phishing campaign used OneNote to distribute the Agent Tesla keylogger. more: https://threatpost.com/microsoft-onenote-sidestep-phishing-detection/153436/ #phishingcampaign #cloudsecurity #websecurity #credentials #emailattack #agenttesla #keylogger #microsoft #onedrive #phishing #malware #onenote
Microsoft OneNote Used To Sidestep Phishing Detection

A recent phishing campaign used OneNote to distribute the Agent Tesla keylogger.

Threatpost - English - Global - threatpost.com
Office for Mac Users Warned of Malicious SYLK Files - Researchers warn XML macros embedded in SYLK files can sidestep Microsoft Office for Mac protectio... more: https://threatpost.com/office-for-mac-malicious-sylk-files/149823/ #unitedstatescomputeremergencyreadinessteam #worldwidewebconsortium #vulnerabilities #protectedview #vulnerability #officeformac #symboliclink #emailattack #hacks #sylk #xml
Office for Mac Users Warned of Malicious SYLK Files

Researchers warn XML macros embedded in SYLK files can sidestep Microsoft Office for Mac protections.

Threatpost - English - Global - threatpost.com