A new targeted attack campaign is waking up large numbers of industries via spear phishing emails. Promptly named, Siesta, the campaign sets in by “sleeping” first for varied time periods before moving on to eventually stealing valuable company data.
A new Internet Explorer zero-day exploit has emerged again, affecting roughly 23% of all destop browser users. Attackers again used social engineering tactics against their targets. How does this affect Microsoft XP users now that support has ended?
PLEAD, a new targeted attack campaign that was found targeting Taiwanese agencies just a week after similar targets were attacked using a Microsoft zero-day exploit. PLEAD uses phishing emails mixed with RTLO and Windows vulnerability techniques to ensnare vic
Two separate attacks were seen targeting government agencies and an educational institute in Taiwan. The attackers used the new Microsoft Word zero-day vulnerability and entered through a bogus email.
Ingenuity can never be underestimated. A zero-day vulnerability was detected in MS Word, which can serve as a gateway for a remote attack.Recent analysis show that attackers have started using the zero-day to target users. How can users stay safe?
Curiosity killed the cat. In the virtual world, it leads to threats too. Stories of doom and terror proved that piquing interests is still an effective way for attackers to get into systems and wreak havoc just as the email subject reads.
The lure of money and power is simply irresistible. Opening the Pandora's box of data and information always leads to a pot of gold. Attackers are now see the value of going straight to the source, especially those with low security protocols in place.
Attackers were found attacking the website of a non-profit organization in the United States with an Internet Explorer zero-day exploit. Microsoft confirms that this particular vulnerability affects IE9 and IE10. Here's what IE users should know.