phishing

  1. NEWS New phishing method looks just like the real thing, but it steals your passwords

    Thanks to a new phishing method, hackers could steal all sorts of personal information by simply mimicking real login forms in Application Mode. This is a feature that’s available in all Chromium-based browsers, which includes Google Chrome, Microsoft Edge, and Brave. :shocked...
  2. VIDEO Email Spoofing | Phishing Attacks | Business Email Compromise | Cyber Defence

    🤔
  3. VIDEO This is how Hackers can *OWN YOU* with just a link!

    :shocked:
  4. VIDEO CAUTION Windows 11 Fake download page will install Malware onto your PC

    :eek:
  5. Windows 10 Another Scam, watch out for this one!

    Got this one today, needless to say, I don't even use Norton! Nowhere does it even say who the charge is too... Thank you for your Auto-Renewal Order. Your Account/Card has been Debited for $299.00 (charges may appear later) Order Details To find more information on your order and to manage...
  6. Windows 10 Another New for me, SCAM!

    I just received this email, it's pretty obvious, that it's a scam, it doesn't even say what you are supposed to have ordered? It states at the bottom if you want to cancel this order, download the cancelation form from the link at the bottom of the page, fill it out and return it...
  7. VIDEO AA21-265A: Conti Ransomware

    Original release date: September 22, 2021 Summary Immediate Actions You Can Take Now to Protect Against Conti Ransomware • Use Link Removed. • Segment and segregate networks and functions. • Update your operating system and software. Note: This Alert uses the MITRE Adversarial Tactics...
  8. Windows 10 New to me, scam!!!

    I received a new to me email message with an attached image file. I didn't click on the image and researched the senders address. ***6762720@vzwpix.com I entered the stars instead of the area code. This seems to be a new scam, at least I've not run into it before. Just a warning, and I was...
  9. Microsoft announces passwordless future – available across Microsoft Edge and Microsoft 365 apps

    I don’t know a single person who enjoys managing passwords. Given how much of my life is spent online and in various apps, keeping track of it all, ensuring they’re unique and regularly updated – it can quickly become overwhelming for me – and I’m a techie! Which is why I’m so excited about...
  10. F

    Windows 10 Botched attachment operation

    Lately when I receive an email from a trusted source and I click on the attachment included, it loads tons of attachments, from where I am not sure. There are many that I have received and no longer have and I think some are from the person sending the email. How can I stop this from happening...
  11. AA21-243A: Ransomware Awareness for Holidays and Weekends

    Original release date: August 31, 2021 Summary Immediate Actions You Can Take Now to Protect Against Ransomware • Make an offline backup of your data. • Do not click on Link Removed. • If you use RDP, secure and monitor it. • Link Removed your OS and software. • Use Link Removed. • Use Link...
  12. AA21-201A: Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013

    Original release date: July 20, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. Note: CISA released technical information...
  13. AA21-148A: Sophisticated Spearphishing Campaign Targets Government Organizations, IGOs, and NGOs

    Original release date: May 28, 2021 Summary The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are responding to a spearphishing campaign targeting government organizations, intergovernmental organizations (IGOs), and non-governmental...
  14. VIDEO AA21-131A: DarkSide Ransomware: Best Practices for Preventing Business Disruption from Ransomware Attacks

    Original release date: May 11, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. The Cybersecurity and Infrastructure Security...
  15. C

    Windows 10 Microsoft 365 Phishing?

    See screen snip below. Can anyone tell me if this is a phishing email or a legitimate email from Microsoft? Thanks.
  16. AA21-076A: TrickBot Malware

    Original release date: March 17, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. The Cybersecurity and Infrastructure Security Agency...
  17. AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware

    Original release date: February 17, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This joint advisory is the result of analytic efforts...
  18. Microsoft Edge 88 Privacy and Security Updates

    We can hardly believe it’s been about one year since we launched the new Microsoft Edge – and what a year it’s been! It’s safe to say that a lot has changed since our launch in January 2020, but one thing that remains constant is our commitment to our users. We’re all more dependent on the web...
  19. AA20-345A: Cyber Actors Target K-12 Distance Learning Education to Cause Disruptions and Steal Data

    Original release date: December 10, 2020<br/><h3>Summary</h3><p>This Joint Cybersecurity Advisory was coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC).</p>...
  20. AA20-336A: Advanced Persistent Threat Actors Targeting U.S. Think Tanks

    Original release date: December 1, 2020<br/><h3>Summary</h3><p class="tip-intro" style="font-size: 15px;"><em>This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&amp;CK®) framework. See the <a href="Techniques - Enterprise | MITRE ATT&CK®">ATT&amp;CK for...