Phishing campaigns, which are the gateway to many data breaches, are becoming far more sophisticated as fraudsters use information available on social media to target their schemes, says Jim Hansen, chief operating officer at online security firm PhishMe.
Local Representative Discusses the State of Global Cybersecurity and Defending Organizations Against Email-borne Attacks with Leader in Human Phishing Defense Solutions
LEESBURG, VA – January 20, 2016 – PhishMe® Inc., the pioneer in human-phishing defense solutions, today received a visit from United States Congresswoman Barbara Comstock to discuss the top cybersecurity threats facing the country. A representative of the 10th District of Virginia, Comstock met with the PhishMe team to tour its Loudoun County-based headquarters and exchange insights on the biggest issues impacting national cybersecurity today.
From time to time, there will be an overlap with malware infrastructure where one attacker will compromise another attacker’s infrastructure. Typically, this is part of the “compromised infrastructure” which can fluctuate, and attackers have even been seen to uninstall one another’s malware. However, in this case, we strongly believe that the actors are experimenting with Dridex, Pony, and Neutrino.
It’s not every day that someone turns off the electricity for more than half a million people just by sending an email. In fact, it had never happened until last month, when hackers tricked Ukrainian power plant employees into giving them access to industrial control systems, the equivalent of a switch that regulates electricity flow out of a power plant. Read More
1/13/2016 Update: The blog has been updated to reflect the translation of the BlackEnergy word document.
On January 4th, ESET released an amazing blog post about the BlackEnergy Trojan being used to attack power companies in the Ukraine to knock out the power in some areas. While this is not the first time we’ve seen cyber attacks become kinetic, the BlackEnergy attacks could have been prevented.