phishing

  1. Pictogrram

    Phishing in 2019

    Does anyone feel that phishing has developed? E.g. in my personal feeling, there are fewer email scams nowadays. Your thoughts, guys?
  2. News

    AA19-024A: DNS Infrastructure Hijacking Campaign

    Original release date: January 24, 2019 Summary The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), is aware of a global Domain Name System (DNS) infrastructure hijacking campaign. Using compromised...
  3. R

    Windows 10 Scammer Thought I Was Easy Prey

    Attention all members. Today, I tapped on a few links while searching for recipes. On about the 4th link, a " Warning Message " appeared to come from an authorized microsoft repair company. The warning stated that my computer will be locked if I shut it down and that I should...
  4. News

    AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide

    Original release date: October 11, 2018 Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.Link Removed[2][3][4]Link Removed In it we highlight the use of five...
  5. MikeHawthorne

    Windows 10 Bogus Emails, what?

    Hi Both my wife and I are getting bogus emails from people we know that we know they aren't sending intentionally. What these messages have in common is the code goo.gl/ I kind of understand that this is a signal to shorten the visible address. The messages have no subject, have a message...
  6. News

    TA18-201A: Emotet Malware

    Original release date: July 20, 2018 Systems Affected Network Systems Overview Emotet is an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware affecting state...
  7. Neemobeer

    Social Engineering

    Some information I've put together regarding social engineering and how people use it to get information. I will likely expand it in the future. ***UPDATE*** This file is safe I did not rig it as a test.
  8. News

    TA17-132A: Indicators Associated With WannaCry Ransomware

    Original release date: May 12, 2017 | Last revised: May 19, 2017 Systems Affected Microsoft Windows operating systems Overview According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with reports of tens of thousands of infections in...
  9. News

    TA16-336A: Avalanche (crimeware-as-a-service infrastructure)

    Original release date: December 01, 2016 | Last revised: December 14, 2016 Systems Affected Microsoft Windows Overview “Avalanche” refers to a large global network hosting infrastructure used by cyber criminals to conduct phishing and malware distribution campaigns and money mule schemes...
  10. News

    TA17-181A: Petya Ransomware

    Original release date: July 01, 2017 Systems Affected Microsoft Windows operating systems Overview On June 27, 2017, NCCIC was notified of Petya ransomware events occurring in multiple countries and affecting multiple sectors. Petya ransomware encrypts the master boot records of infected...
  11. News

    TA17-132A: Indicators Associated With WannaCry Ransomware

    Original release date: May 12, 2017 | Last revised: May 13, 2017 Systems Affected Microsoft Windows operating systems Overview According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with reports of tens of thousands of infections in as...
  12. News

    Customer Guidance for WannaCrypt attacks

    Microsoft solution available to protect additional products Today many of our customers around the world and the critical systems they depend on were victims of malicious “WannaCrypt” software. Seeing businesses and individuals affected by cyberattacks, such as the ones reported today, was...
  13. News

    Coming together to address Encapsulated PostScript (EPS) attacks

    Today’s security updates include three updates that exemplify how the security ecosystem can come together to help protect consumers and enterprises. We would like to thank FireEye and ESET for working with us. Customers that have the latest security updates installed are protected against the...
  14. News

    SHA-1 Collisions Research

    Today, a group of eight researchers from across the security industry released a research report on SHA-1 that demonstrates for the first time, a “hash collision” for the full SHA-1 hash algorithm (called “SHAttered”). This is a significant step toward understanding this type of security issue...
  15. News

    TA16-336A: Avalanche (crimeware-as-a-service infrastructure)

    Original release date: December 01, 2016 Systems Affected Microsoft Windows Overview “Avalanche” refers to a large global network hosting infrastructure used by cyber criminals to conduct phishing and malware distribution campaigns and money mule schemes. The United States Department of...
  16. pnamajck

    malwarebytes imitation …

    don't get suckered into the imitation software … always go directly to the source … in this case www.malwarebytes.com . yep, another new ransomware variant is making the rounds … trying to pass itself off as legitimate software. supposedly the filename is...
  17. MikeHawthorne

    Windows 10 Not a fishing enthusiast.

    Hi I've been getting Phishing emails in the last few days. I got one from my bank saying that someone had tried to log into my account and asked me to input my Account information and Password, to confirm that I was the account holder. It said that if I didn't do this immediately my account...
  18. News

    2880823 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program -...

    Revision Note: V2.0 (May 18, 2016): Advisory updated to provide links to the current information regarding the use of the SHA1 hashing algorithm for the purposes of SSL and code signing. For more information, see Windows Enforcement of Authenticode Code Signing and Timestamping. Summary...
  19. News

    Exchange Online Protection updates - Zero-hour Auto Purge (ZAP), Safety Tips and more |...

    With Office 365, we continue to invest in new protections against malicious email attacks. Today Shobhit Sahay from the Office 365 team walks through seven new Exchange Online Protection (EOP) and Advanced Threat Protection (ATP) features that proactively identify and block the most dangerous...
  20. News

    3123479 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program -...

    Revision Note: V1.0 (January 12, 2016): Advisory published. Summary: Microsoft is announcing a policy change to the Microsoft Root Certificate Program. The new policy no longer allows root certificate authorities to issue X.509 certificates using the SHA-1 hashing algorithm for the purposes of...
Back
Top