Cybercriminals impersonate World Health Organization to distribute fake coronavirus e-book

Threat actors ramp up on coronavirus-themed campaigns, posing as the World Health Organization sending emails with fake e-book content. Instead of advice, users get compromised with malware.

Read more

Spear phishing 101: what you need to know

We look at the threat of spear phishing, why it’s such a problem, and what organizations can do to lessen the chance of a successful attack.

Read more

Instagram clamps down on fake messages with anti-phishing tool

We take a look at a new anti-phishing feature Instagram hopes will cut down on imitation messages and other social engineering attempts.

Read more

Emotet malspam campaign uses Snowden’s new book as lure

Emotet starts a new week of malicious spam by promising a copy of Edward Snowden’s new book.

Read more

Emotet is back: botnet springs back to life with new spam campaign

After months of laying dormant, the notorious Emotet is back, with its botnet spewing spam globally.

Read more

Ryuk ransomware attacks businesses over the holidays

Over the holiday, a little-known ransomware family called Ryuk caused serious damage to numerous organizations. The attacks leave a lot of questions unanswered. What do we know so far?

Read more

What’s in the spam mailbox this week?

We take a look at a few of the most notable spam emails in circulation over the last week, including a money muling scam, Apple phishes, and a sexploitation message featuring old, but real, passwords.

Read more

Five easy ways to recognize and dispose of malicious emails

What should you check for to determine if an email is spam or malicious? Here are five red flags to look for—and what to do with those malicious emails when you find them.

Read more

Internet Shortcut used in Necurs malspam campaign

The Necurs gang tries out a new trick to load malware and bypass security defenses.

Read more

Labs CTNT report shows shift in threat landscape to cryptomining

What did we learn about cybercrime in the quarterly Labs CTNT report? Malicious cryptomining has taken over in 2018, and it’s leaving all other malware families behind.

Read more

Select your language