Best Practices to Thwart Business Email Compromise (BEC) Attacks
Business email compromise (BEC) refers to all types of email attacks that do not have payloads. Although there are numerous types, there are essentially two main mechanisms through which attackers…
Chinese Hackers Implant PlugX Variant on Compromised MS Exchange Servers
A Chinese cyberespionage group known for targeting Southeast Asia leveraged flaws in the Microsoft Exchange Server that came to light earlier this March to deploy a previously undocumented variant of…
Enterprise data breach cost reached record high during COVID-19 pandemic
IBM research estimates that the average data breach now costs upward of $4 million. Read more from the Source
Hackers Posed as Aerobics Instructors for Years to Target Aerospace Employees
An Iranian cyberespionage group masqueraded as an aerobics instructor on Facebook in an attempt to infect the machine of an employee of an aerospace defense contractor with malware as part…
