Many employees are at least curious about their next job. That is the basis for this attack. The attacker sends Linkedin direct messages from a legitimate Linkedin account. If that doesn’t appeal to the target, the attacker sends emails to the targets business email address suggesting a job offer. The links in the email points […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I wrote a while back about hackers that had compromised a law firm and its customer Hiscox insurance – or said differently Hiscox and its vendor. The law firm was handling claims related to 9/11 (almost 20 years later and still litigating!). A lot of law firms (certainly not all) have not figured out that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Many of us use Internet services – Dropbox for file sharing, Google for collaboration, Mint for finances and many others. Some of us – individuals and businesses – have data spread far and wide over the web. So wide that in many cases we really don’t know where our data lives or how it is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
GoDaddy has an interesting feature. If a hacker creates a FREE GoDaddy account they can and have created a whole bushel of mischief. If you have a free account, you can use GoDaddy’s managed DNS service for free for a limited amount of time. Only problem is that GoDaddy didn’t validate that you owned the domain […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Homeland Security’s newly named agency – the Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive to executive branch agencies – many of which have personnel on furlough – regarding a DNS hijacking issue. The issue is not limited to agencies and every company and private individual that owns one or more Internet domains […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Some of the most popular business email compromise scams (BEC) target accounting and finance or human resources. The scam usually works something like this. Someone in the target department – often not too high up in the food chain – gets a email pretending to be from an executive like the CEO or CFO. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]