21st-century technology has allowed Cybercriminals to use sophisticated and undetectable methods for malicious activities. In 2020 alone, a survey revealed that 65% of US-based companies were vulnerable to email phishing and impersonation attacks. This calls for upgrading your organization's security with DMARC, which if not implemented, will enable cyber-attackers … [Read more...] about How DMARC Can Stop Criminals Sending Fake Emails on Behalf of Your Domain
Fake
Checkrain fake iOS jailbreak leads to click fraud
Threat Research Attackers are capitalizing on the recent discovery of a new vulnerability that exists across legacy iOS hardware. Cisco Talos recently discovered a malicious actor using a fake website that claims to give iPhone users the ability to jailbreak their phones. However, this site just prompts users to download a malicious profile … [Read more...] about Checkrain fake iOS jailbreak leads to click fraud
Talos Targets Disinformation with Fake News Challenge Victory
Threat Research This post was authored by Sean Baird with contributions by Doug Sibley and Yuxi Pan Executive SummaryFor the past several months, the problem of “fake news” has been abuzz in news headlines, tweets, and social media posts across the web. With historical roots in information warfare and disinformation, “fake news” is a … [Read more...] about Talos Targets Disinformation with Fake News Challenge Victory
How Tortoiseshell created a fake veteran hiring website to host malware
Threat Research Cisco Talos recently discovered a threat actor attempting to take advantage of Americans who may be seeking a job, especially military veterans. The actor, previously identified by Symantec as Tortoiseshell, deployed a website called hxxp://hiremilitaryheroes[.]com that posed as a website to help U.S. military veterans find … [Read more...] about How Tortoiseshell created a fake veteran hiring website to host malware
How to recognize fake charity campaigns on the Internet
Facebook has been experiencing a wave of fake fundraising campaigns. The pattern is familiar: Attackers create groups from scratch to which they add a couple of posts. They provide bank transfer details along with a bunch of tear-jerking comments. The groups tend to follow a template. The group’s name contains an appeal for help, and the posts provide emotional stories, usually … [Read more...] about How to recognize fake charity campaigns on the Internet