Attackers are using XLL files to embed malicious code in Office documents, according to researchers at Cisco Talos. Microsoft is phasing out the ability to execute VBA macros in Office documents. These macros have been one of the most popular … Read More
Monthly Archives: December 2022
’Tis the season for Scam-Folly Fa La La La La
The festive season is my favorite time of the year. It is a time to celebrate and reconnect with our family, friends and community and the one time in the year where the whole country feels like it is on … Read More
Ivanti Report Shows Cybersecurity Practitioners Concentrating on Right Threats
A recent Ivanti report shows cybersecurity practitioners getting more focused on the threat landscape, but defenders may need to hone their attention to focus on the right threats.
CyberheistNews Vol 12 #51 [Ughh] The FBI’s Trusted Threat Sharing ‘InfraGard’ Network Was Hacked
Now BEC Attacks Steal Physical Goods
The Federal Bureau of Investigation (FBI), the Food and Drug Administration Office of Criminal Investigations (FDA OCI), and the US Department of Agriculture (USDA) have released a joint advisory warning that scammers are launching business email compromise (BEC) attacks to … Read More
(ISC)2 CEO Discusses UK and Global Cyber Challenges at Chatham House
UK cybersecurity leaders recently gathered for a Chatham House members event panel in London to discuss the heightened need for a skilled workforce, the effects the COVID-19 pandemic had on the global cyber workforce and developing skills for the next … Read More
Policy Brief – U.S. Cyber Threat Intelligence, Part 1: Introduction & Background
By Aaron Weathersby, CISSP. Aaron is the Chief Information Officer for Charles R. Drew University of Medicine and Science and holds a Doctor of Science in Cyber Security from Marymount University. He is an Information Technology professional with over 18 … Read More
SSCP Members – We Need Your Input
The SSCP certification is held by more than 7,000 professionals around the world. Known for its technical rigor, the members who hold this qualification are typically working in areas like IT administration, networks security, security operations or incident response. The … Read More
Social Engineering, Money Mules, and Job Seekers
A small town in Manitoba, WestLake-Gladstone (population about 3300), fell victim to a social engineering campaign. The municipal government seems to have been a target of opportunity, but it lost some $433 thousand to scammers.
LATEST CYBERTHREATS AND ADVISORIES – DECEMBER 16, 2022
The rise of new ransomware gangs, cyberattacks on Uber and California’s Department of Finance make headlines this week. Here are the latest threats and advisories for the week of December 16, 2022. Threat Advisories and Alerts U.K. Government Sets New … Read More
Less Than One-Third of Organizations Leverage Multiple Authentication Factors to Secure Their Environment
Demonstrating a complete lack of focus on the need for additional authentication factors, surprising new data highlights a material security gap that enables cybercrime.
Hospitals Warned of Royal Ransomware Attacks by U.S. Department of Health
This brand new ransomware gang is on the attack and, despite them being new to the game, are coming out of the gate attacking the healthcare sector and asking for millions in ransom.
2022 (ISC)² Member Bloggers
The success of our membership-driven organization is closely linked to the effort that each certification holder puts into the organization. At (ISC)², we are fortunate to have a highly engaged membership that actively contributes to our success through volunteer opportunities. … Read More
October and November Have Been the Two Busiest Months for Ransomware
Trending data going back to January of 2020 shows that ransomware attacks are continually increasing in number with unusual highs in the 4th quarter.
Interest in Infostealer Malware Within Cyberattacks Spikes as MFA Fatigue Attacks Increase
New analysis of dark web forums shows an increase in discussions around the use of infostealer malware as part of both the first attack within a campaign or as part of an initial access attack.
Cybersecurity Experts Weigh in on Modern Email Attacks
Abnormal Security’s CISO, Mike Britton consolidates some of the best advice from a three-part webinar series on the current state of risk found in email-based cyberattacks
Ten Charged with BEC Healthcare Scheme That Took More than $11 Million
Tricking five state Medicaid programs, two Medicare Administrative Contractors, and two private health insurers, the scammers posed as hospitals to alter payment details.
(ISC)² Annual Meeting Outcomes – Bylaws Amendments and 2023 Board of Directors
The (ISC)² Annual Meeting was held today (December 14, 2022), and below are the key outcomes from the meeting: Bylaw Vote Results The (ISC)² Board of Directors submitted bylaw amendments to the membership. The amendments were put to a vote … Read More
Look Out For Scammers This Holiday Season on Social Media
You know how some gifts are insanely sought after each year, selling out in mere minutes? Well, these are great tools for scammers, especially on social media.
Utility Bill is the New Phishbait for Cybercriminals
An SMS phishing (smishing) campaign is impersonating utility providers in the US, Cybernews reports. Researchers at Enea AdaptiveMobile Security spotted the campaign, which informs recipients of offers to save money. The text messages contain offers related to gas prices, electricity … Read More