Blog
December 28, 2022 by Vertical Axion
A new phishing campaign targeting Facebook users has been identified by cybersecurity firm Trustwave. In this campaign, hackers use fake copyright infringement notices to trick users into giving away their account details. The phishing messages claim that Facebook will delete …
Read more »
Tagged
December 27, 2022 by Vertical Axion
LastPass, a popular password manager, announced that an unauthorized party accessed the company’s archived backups of its production data on a third-party cloud-based storage service. According to the company’s investigation, a threat actor accessed the cloud storage environment in August …
November 30, 2022 by Vertical Axion
The FBI warns about scammers pretending to be refund payment gateways from financial institutions to steal sensitive information from unsuspecting victims. The federal law enforcement agency stated that scammers deceive victims into granting them access to their computers via email …
November 29, 2022 by Vertical Axion
Earlier this year, Twitter confirmed that an API vulnerability had caused a massive data leak containing non-public information for over 5.4 million Twitter users. Twitter denied claims that hackers had leaked the private information priorly. However, Pompompurin, the owner of …
November 28, 2022 by Vertical Axion
Threat actors may now launch their own sophisticated assaults thanks to the emergence of Phishing as a Service (PhaaS) platforms like “Caffeine.” Through an open registration procedure, anyone who wishes to launch their phishing campaign can sign up on these …
November 23, 2022 by Vertical Axion
Security experts at Akamai have discovered a campaign that uses an elaborate phishing kit. This campaign targets Americans using lures centered around holidays like Labor Day and Halloween. The kit combines several methods and employs several evasion detection techniques to …
November 15, 2022 by Vertical Axion
It’s getting easier than ever to conduct effective phishing campaigns thanks to the rise in popularity of SaaS platforms. A recently published report released by Palo Alto Networks’ Unit 42 revealed that the use of Software as a Service to …
November 7, 2022 by Vertical Axion
It’s no secret that cyber attacks are on the rise, and that no company is immune to them. Dropbox, a cloud storage company, was the lastest victim when their GitHub account was compromised. This allowed attackers access to 130 code …
November 2, 2022 by Vertical Axion
Phishing is one of the oldest forms of cybercrime. It continues to grow and evolve, making it difficult for people to defend themselves. Callback phishing scams are email campaigns that pose as expensive memberships to confuse recipients who have never …
October 26, 2022 by Vertical Axion
On October 7, 2022, Toyota Motor Corporation made an announcement that the personal information of approximately 296,000 consumers had been compromised. The Toyota T-Connect system enables owners of Toyota automobiles to link their cell phones to their vehicles. By doing …
September 30, 2022 by Vertical Axion
Recently, researchers at Mitiga have sounded the alarm about a new Business Email Compromise (BEC) campaign. They discovered evidence of the campaign responding to another incident and have watched the campaign grow in scope and scale over time. Here’s how …
September 14, 2022 by Vertical Axion
Hackers are increasingly adopting practices that legitimate business owners will immediately recognize. Recently, a new PhaaS (Phishing as a Service) operation has surfaced that specifically targets major banks. These banks include Bank of America, Wells Fargo, Citibank, Capital One, PNC, …
August 31, 2022 by Vertical Axion
According to ongoing research by Group-IB, a massive phishing campaign is currently underway. This is a campaign that has impacted no less than 130 organizations across a broad range of industries. These include but are not limited to professional recruiting …
August 13, 2022 by Vertical Axion
Twilio is the Cloud Communications Company. They are the latest to fall victim to a data breach. The company recently disclosed that some of its customer data was accessed by unknown attackers who gained access to the system by stealing …
August 12, 2022 by Vertical Axion
Are you a fan of NFTs? If so, you’ve probably heard of OpenSea, which is the largest marketplace for non-fungible tokens. If you have an account there, be aware that recently the company disclosed that their network had been breached …
August 5, 2022 by Vertical Axion
Researchers at Trustwave have shed light on a recently discovered phishing campaign revolving around Facebook Messenger bots. If you don’t spend much time on social media, chatbots are programs designed to impersonate live people and are usually relegated the task …
August 1, 2022 by Vertical Axion
Are you a member of the Windows 11 Insiders group? If so, then you already know that you get a sneak peek at all the cool new features the engineers at Microsoft are building into the new Operating System. If …
July 28, 2022 by Vertical Axion
While “vishing” is by no means a new threat, it’s not something that has ever happened with sufficient frequency to get most people’s attention. So, if you haven’t heard the term before, you’re not alone. “Vishing” is short for voicemail …
July 8, 2022 by Vertical Axion
According to research conducted by the cybersecurity firm PIXM, there is a massive phishing campaign that peaked in April and May of this year (2022) and it is still ongoing. The campaign has lured millions of unsuspecting users to phishing …
June 13, 2022 by Vertical Axion
HTML attachments as an attack vector may seem a little old school. However, according to statistics compiled by Kaspersky Lab indicates that in 2022, that form of attack is not just simply still being employed, but hackers are making surprisingly …
June 8, 2022 by Vertical Axion
Phishing campaigns get more effective the more closely they can imitate a trusted source. Recently, security researchers at Fortinet discovered evidence of a phishing campaign that specifically targets Microsoft Windows users and installs three different types of malware on the …
May 27, 2022 by Vertical Axion
Google SMTP relay service is wildly popular and used every day by legions of users. Unfortunately, hackers around the world are aware of this and increasingly they’ve begun abusing the SMTP relay service. The basic idea is as follows. Some …
May 10, 2022 by Vertical Axion
Considered to be social media for professionals, LinkedIn is an invaluable tool for millions of people all over the world and a great way to make a wide range of professional connections. Unfortunately, hackers and scammers are aware of this …
May 2, 2022 by Vertical Axion
If you’re a member of the Windows Insiders group, you may already be aware of this. If you missed the company’s announcement be on the lookout for some new security improvements in upcoming releases. Microsoft has been playing an increasingly …
507-388-3880