Author: tetiana.vashchenko@data443.com

Phishing for the big phish in United Kingdom’s plentiful waters

In 2014, the phishing URLs tracked by CYREN increased dramatically, rising 233% from the previous year. Why did this number increase? One reason is the potential for monetary gain. Cyber criminals use phishing attacks to steal personally sensitive and identifiable information from users. Sometimes this is to gain access to

New Tricks of Macro Malware

In the past few months, we have noticed a rise in spam emails that have an attachment of “.DOC” extension filename but actually is a “.MHT” file. This trending trick seems to be a new way to spread macro malware. A file with “.MHT” extension is a Web page archive

Lessons Learned from the Slack & Hipchat Breaches

In late March Slack confirmed they had suffered a security breach where “there was unauthorized access to a Slack database storing user profile information”. Slack is a recently launched team collaboration tool that offers organizations a way to simplify communications, file-sharing, project management and more. Organizations sign up their employees

Analyzing an Outlook phishing attack

It is in my routine to read emails before starting my daily work while enjoying my cup of coffee. While browsing for important emails I need to separate spam emails from legitimate emails and analyze the spam emails. I was trying to sort out the spam emails when I came

‘Oil’ be on your Mind: Recordkeeping and Compliance in Oil & Gas

What do CERCLA, ISO, and SOX mean to you and your business? With increased attention on good governance practices, oil and gas industry members are only an acronym away from experiencing a regulatory rain that rivals hell’s brimstone. Luckily, all the pain can be avoided with good records management and

What’s In & What’s Out: What Should Stay On Your Shared Drives

What’s In & What’s Out: What Should Stay On Your Shared Drives It’s time. You’re finally migrating your files, maybe to a new SharePoint site or some other improved file repository. But it seems like you’re faced with an insurmountable task. Which files should you take with you to this

New Macro Malware Uses Fake Google Enterprise Support Email

In the past months of analyzing malware samples, Macro malware has been on the rise. Last week, we received a fake email of Google Enterprise Support with an attachment file “Info I44185821.zip-> Wire_info_60255.doc”. See the email snapshot below.  The file “Wire_info_60255.doc” is indeed a Word document which contains a malicious