Threat actors are using #phishing tactics to trick users into giving access to #M365 accounts.
⚠️ Successful compromise leads to #accounttakeover, #dataexfiltration, and more.
Blog: brnw.ch/21wYtcM
Here’s what you need to know. 🧵⤵️
Threat actors are using #phishing tactics to trick users into giving access to #M365 accounts.
⚠️ Successful compromise leads to #accounttakeover, #dataexfiltration, and more.
Blog: brnw.ch/21wYtcM
Here’s what you need to know. 🧵⤵️
Proofpoint is seeing an increase in holiday-themed threats. Main #phishing lure themes include party invitations, holiday vouchers, end-of-year bonuses, and holiday travel.
Proofpoint is seeing an increase in holiday-themed threats. Main #phishing lure themes include party invitations, holiday vouchers, end-of-year bonuses, and holiday travel.
The sophisticated cybercriminal, notably, appears to own its entire attack chain with multiple delivery techniques.
Learn about TA585 and one of its favored payloads, MonsterV2: brnw.ch/21wWAAU.
The sophisticated cybercriminal, notably, appears to own its entire attack chain with multiple delivery techniques.
Learn about TA585 and one of its favored payloads, MonsterV2: brnw.ch/21wWAAU.
Blog: www.proofpoint.com/us/blog/thre....
Blog: www.proofpoint.com/us/blog/thre....
At least 3️⃣ distinct China-aligned threat actors are behind the efforts. brnw.ch/21wUctY
At least 3️⃣ distinct China-aligned threat actors are behind the efforts. brnw.ch/21wUctY
A two-part blog series in collaboration with
@threatray.bsky.social, which aims to substantiate the claim that #TA397 (Bitter) is an espionage-focused, state-backed threat actor with interests aligned to the Indian state.
Part 1: brnw.ch/21wT9A5
Part 2: brnw.ch/21wT9Ad.
A two-part blog series in collaboration with
@threatray.bsky.social, which aims to substantiate the claim that #TA397 (Bitter) is an espionage-focused, state-backed threat actor with interests aligned to the Indian state.
Part 1: brnw.ch/21wT9A5
Part 2: brnw.ch/21wT9Ad.
Proofpoint also published a brief history of DanaBot today, including examples of the espionage overlap. www.proofpoint.com/us/blog/thre...
Proofpoint also published a brief history of DanaBot today, including examples of the espionage overlap. www.proofpoint.com/us/blog/thre...
The campaign, which took place in November 2024, targeted a defense sector organization in Turkey.
Read the blog: ow.ly/z81o50UshPt.
The campaign, which took place in November 2024, targeted a defense sector organization in Turkey.
Read the blog: ow.ly/z81o50UshPt.
Meanwhile, check out the new risky.biz website. You can get everything there -- written content, podcasts/audio and video as well.
A nice website! And it only took me 18 years!
Meanwhile, check out the new risky.biz website. You can get everything there -- written content, podcasts/audio and video as well.
A nice website! And it only took me 18 years!
🧵⤵️
1) spoofing swisscom (note 'S', domain just reg'd)
2) leveraging encrypted rar + lnk + self signed pdf reader
3) BGP lure (fits with theme of email). BGP is the third leg in the outage triumvirate)
"It was wrongful for the University to direct his arrest and encourage his prosecution" drive.google.com/file/d/1jIx1...
"It was wrongful for the University to direct his arrest and encourage his prosecution" drive.google.com/file/d/1jIx1...
Web: www.proofpoint.com/us/podcasts/...
Apple: podcasts.apple.com/us/podcast/d...
Spotify: open.spotify.com/episode/2AtJ...
Web: www.proofpoint.com/us/podcasts/...
Apple: podcasts.apple.com/us/podcast/d...
Spotify: open.spotify.com/episode/2AtJ...
Get it as audio from the usual places or from YouTube here:
www.youtube.com/watch?v=Rxye...
Get it as audio from the usual places or from YouTube here:
www.youtube.com/watch?v=Rxye...