Siccura – Private and Secure Digital Life

Editorial Team

Phishing Campaign, Phishing Attacks, Phishing Attack, Email Scam

Unusual Attachment now associated with Phishing attacks

According to Trustwave, Windows Imaging Format (WIM) files are now being used in phishing attacks. As WIM files aren’t typically thought as harmful, it makes it easier for data thieves to exploit them and get past security filters. These spams, spoofing courier businesses contain a malicious WIM file disguised as an invoice or consignment note. …

Unusual Attachment now associated with Phishing attacks Read More »

Remote Working, Work from Home, Working Remotely

Poor security habits during pandemic

With over half (51%) of 16-24 year olds and almost half (46%) of 25-34 year olds reporting they’ve used security workarounds, Younger employees are most likely to admit they cut cybersecurity corners, Tessian says. Additionally, two-fifths (39%) of those who work from home say their cybersecurity practises differ from those in the workplace, with half saying it’s …

Poor security habits during pandemic Read More »

Spear Phishing Attacks, Spear Phishing, Phishing Attacks, Spear Phishing Scams

Top things you must know about spear phishing

Spear-phishing is a targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim, often for malicious reasons. This is achieved by acquiring personal details on the victim such as their friends, hometown, employer, locations they frequent, and what they have recently bought online. The attackers then disguise themselves …

Top things you must know about spear phishing Read More »

Online Hacking, Hackers Space, Online Hackers, Security Myth

Security Myth – I don’t have anything a hacker would want

You may be thinking your information is not good. You might even be thinking that because you’re not rich, nobody would want your information. Since you believe that you don’t have anything to give away, you’re naturally going to start believing that there’s no reason to protect your data or identity. But this is far …

Security Myth – I don’t have anything a hacker would want Read More »

BEC Compromise BEC Phishing, Phishing Attack

Watch Out! New phishing attack steals Office 365 credentials

Microsoft has just discovered a new phishing attack that bypasses their Microsoft Exchange basic authentication protocols. This new phishing campaign touts a file that the recipient must read pointing to a malicious link that takes victims to a lookalike Office 365 login page. Once the victim offers up their credentials a “file not found” message is …

Watch Out! New phishing attack steals Office 365 credentials Read More »

Price Based Country test mode enabled for testing United States (US). You should do tests on private browsing mode. Browse in private with Firefox, Chrome and Safari


Copyright © 2024 Siccura. All Rights Reserved.