Monthly Archives: December 2022

XLL Files Used to Deliver Malware

Attackers are using XLL files to embed malicious code in Office documents, according to researchers at Cisco Talos. Microsoft is phasing out the ability to execute VBA macros in Office documents. These macros have been one of the most popular … Read More

’Tis the season for Scam-Folly Fa La La La La

The festive season is my favorite time of the year. It is a time to celebrate and reconnect with our family, friends and community and the one time in the year where the whole country feels like it is on … Read More

Ivanti Report Shows Cybersecurity Practitioners Concentrating on Right Threats

A recent Ivanti report shows cybersecurity practitioners getting more focused on the threat landscape, but defenders may need to hone their attention to focus on the right threats. 

CyberheistNews Vol 12 #51 [Ughh] The FBI’s Trusted Threat Sharing ‘InfraGard’ Network Was Hacked

Now BEC Attacks Steal Physical Goods

The Federal Bureau of Investigation (FBI), the Food and Drug Administration Office of Criminal Investigations (FDA OCI), and the US Department of Agriculture (USDA) have released a joint advisory warning that scammers are launching business email compromise (BEC) attacks to … Read More

(ISC)2 CEO Discusses UK and Global Cyber Challenges at Chatham House

UK cybersecurity leaders recently gathered for a Chatham House members event panel in London to discuss the heightened need for a skilled workforce, the effects the COVID-19 pandemic had on the global cyber workforce and developing skills for the next … Read More

Policy Brief – U.S. Cyber Threat Intelligence, Part 1: Introduction & Background

By Aaron Weathersby, CISSP. Aaron is the Chief Information Officer for Charles R. Drew University of Medicine and Science and holds a Doctor of Science in Cyber Security from Marymount University. He is an Information Technology professional with over 18 … Read More

SSCP Members – We Need Your Input

The SSCP certification is held by more than 7,000 professionals around the world. Known for its technical rigor, the members who hold this qualification are typically working in areas like IT administration, networks security, security operations or incident response. The … Read More

Social Engineering, Money Mules, and Job Seekers

A small town in Manitoba, WestLake-Gladstone (population about 3300), fell victim to a social engineering campaign. The municipal government seems to have been a target of opportunity, but it lost some $433 thousand to scammers.

LATEST CYBERTHREATS AND ADVISORIES – DECEMBER 16, 2022

The rise of new ransomware gangs, cyberattacks on Uber and California’s Department of Finance make headlines this week. Here are the latest threats and advisories for the week of December 16, 2022. Threat Advisories and Alerts U.K. Government Sets New … Read More

Less Than One-Third of Organizations Leverage Multiple Authentication Factors to Secure Their Environment

Demonstrating a complete lack of focus on the need for additional authentication factors, surprising new data highlights a material security gap that enables cybercrime.

Hospitals Warned of Royal Ransomware Attacks by U.S. Department of Health

This brand new ransomware gang is on the attack and, despite them being new to the game, are coming out of the gate attacking the healthcare sector and asking for millions in ransom.

2022 (ISC)² Member Bloggers

The success of our membership-driven organization is closely linked to the effort that each certification holder puts into the organization. At (ISC)², we are fortunate to have a highly engaged membership that actively contributes to our success through volunteer opportunities. … Read More

October and November Have Been the Two Busiest Months for Ransomware

Trending data going back to January of 2020 shows that ransomware attacks are continually increasing in number with unusual highs in the 4th quarter.

Interest in Infostealer Malware Within Cyberattacks Spikes as MFA Fatigue Attacks Increase

New analysis of dark web forums shows an increase in discussions around the use of infostealer malware as part of both the first attack within a campaign or as part of an initial access attack.

Cybersecurity Experts Weigh in on Modern Email Attacks

Abnormal Security’s CISO, Mike Britton consolidates some of the best advice from a three-part webinar series on the current state of risk found in email-based cyberattacks

Ten Charged with BEC Healthcare Scheme That Took More than $11 Million

Tricking five state Medicaid programs, two Medicare Administrative Contractors, and two private health insurers, the scammers posed as hospitals to alter payment details.

(ISC)² Annual Meeting Outcomes – Bylaws Amendments and 2023 Board of Directors

The (ISC)² Annual Meeting was held today (December 14, 2022), and below are the key outcomes from the meeting: Bylaw Vote Results The (ISC)² Board of Directors submitted bylaw amendments to the membership. The amendments were put to a vote … Read More

Look Out For Scammers This Holiday Season on Social Media

You know how some gifts are insanely sought after each year, selling out in mere minutes? Well, these are great tools for scammers, especially on social media.

Utility Bill is the New Phishbait for Cybercriminals

An SMS phishing (smishing) campaign is impersonating utility providers in the US, Cybernews reports. Researchers at Enea AdaptiveMobile Security spotted the campaign, which informs recipients of offers to save money. The text messages contain offers related to gas prices, electricity … Read More