
Emotet Returns to Hit 100K Mailboxes Per Day
Just in time for the Christmas holiday, Emotet is sending the gift of Trickbot.
Threatpost - English - Global - threatpost.com
Office 365 OAuth Attack Targets Coinbase Users
Attackers are targeting Microsoft Office 365 users with a Coinbase-themed attack, aiming to take control of their inboxes via OAuth.
Threatpost - English - Global - threatpost.com
Office 365 Phishing Attack Leverages Real-Time Active Directory Validation
Attackers check the victims' Office 365 credentials in real time as they are typed into the phishing landing page, by using authentication APIs.
Threatpost - English - Global - threatpost.com
First-Ever Russian BEC Gang, Cosmic Lynx, Uncovered
Researchers warn that Cosmic Lynx targets firms that don't use DMARC and uses a "mergers and acquisitions" pretext that can lead to large sums of money being stolen.
Threatpost - English - Global - threatpost.comSupreme Court Phish Targets Office 365 Credentials
Cybercriminals are hunting out victims' Office 365 credentials – by dishing out Supreme court "summons" in a phishing attack.
Threatpost - English - Global - threatpost.comScammers target COVID-19 CARES Act relief scheme
US states are being flooded by fraudulent unemployment applications in a scam run by a sophisticated cybergang.
Naked SecurityBEC Gang Exploits G Suite, Long Domain Names in Cyberattacks - BEC gangs like "Exaggerated Lion" are using tricky tactics - like exploiting G Suite - to scam com... more:
https://threatpost.com/bec-gang-exploits-g-suite-long-domain-names-in-cyberattacks/155718/ #businessemailcompromise #emailcompromise #emailattack #becattack #phishing #videos #scam #becBEC Gang Exploits G Suite, Long Domain Names in Cyberattacks
BEC gangs like "Exaggerated Lion" are using tricky tactics – like exploiting G Suite – to scam companies out of millions.
Threatpost - English - Global - threatpost.comMicrosoft OneNote Used To Sidestep Phishing Detection
A recent phishing campaign used OneNote to distribute the Agent Tesla keylogger.
Threatpost - English - Global - threatpost.comOffice for Mac Users Warned of Malicious SYLK Files
Researchers warn XML macros embedded in SYLK files can sidestep Microsoft Office for Mac protections.
Threatpost - English - Global - threatpost.com