Tag: pdf

Phishing Attacks Using PDF Files Have Skyrocketed

Phishing attacks using PDF files have spiked over the past year, according to researchers at Palo Alto Networks’ Unit 42.“From 2019-20, we noticed a dramatic 1,160% increase in malicious PDF files – from 411,800 malicious files to 5,224,056,” the researchers write. “PDF files are an enticing phishing vector as they are cross-platform and allow attackers […]

Automated Tailored EBAY Spam Campaign Leads to Risky Sites

Automated spam on eBay is spreading tailored phishing messages offering to promote users’ products, and the links the spammers share can lead to dangerous websites, according to Paul Ducklin at Naked Security.The messages themselves contain text customized to a product the target has just posted, and they include an image of a shortened, easy-to-read URL […]

Q1 2019 Top-Clicked Phishing Email Subjects from KnowBe4 [INFOGRAPHIC]

Every quarter, KnowBe4 reports on the top-clicked phishing emails by subject lines in three categories: Social, General, and ‘In the Wild’. The latter category results come from the millions of users that click on our Phish Alert Button to report real phishing emails and allow our team to analyze the results.Social Media Is Now A […]

Syrian Honey Trap – Daily Security Byte EP.16

Bad actors have always tried to lure us into doing things we shouldn’t by appealing to our base, carnal instincts. Today’s daily infosec video shares why you might want to avoid “hot girls” in general online. (Episode Runtime: 1:38) Direct YouTube Link:  https://www.youtube.com/watch?v=TyivxEiCuKM EPISODE REFERENCES: “Hot Girls” are still an effective lure, even among nation-state attackers – Gizmodo FireEye’s report on the Syrian “Hot Girl” attack campaign [PDF] – FireEye —  Corey Nachreiner, CISSP  ( @SecAdept )

Comparing the traffic utilization of IP Groups in a single report

This blog is to let you know how NetFlow Analyzer can be efficiently used for generating report for comparing the traffic stats for different data-centers or departments in your network. Imagine the time and the hassles involved in collecting the data form those groups from all you devices.Then consolidating the data you have and generating the report.