<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

CATEGORY ARCHIVES: phishing-attack

Watch out for Phishing this (online) Holiday Season

Winter holidays are a glowing delight, filled with cozy warm drinks, great food, decorations, family traditions, and of course – presents. Families know the feeling of December creeping in, and the burst of joy filled with urgency that comes with it. People rush to shopping malls by the handfuls, making a day (or days) of purchasing gifts for their friends and loved ones. But the Covid-19 pandemic has reshaped the holiday shopping experience, migrating holiday shoppers from mall trip extravaganzas to multi-platform online shopping. Probably the last thing buyers are thinking about when deliberating between a blue bike or a green scooter is the plethora of cyber attackers just waiting for them to make one mistaken make one wrong click, and fall victim to a phishing scam that can drain all the money (and holiday joy) from your stocking.

Read More

Share this:

What Is a Botnet? Common Architecture, Purpose & Attack Types

What Is a Botnet?

A botnet is a distributed network consisting of many compromised internet-connected devices, which are controlled by a centralized botmaster, and are utilized to perform synchronized tasks. Each infected machine is called a bot, and together their power is used to carry out various attacks. Botnets are usually created via malware infections, which gain persistence on the machines and “recruit” them to the botnet. Some of these malware variants can even self-propagate through networks, infecting many devices via one network entry point. The bandwidth amount “taken” from each bot is relatively small, so that the victim will not realize that their device is being exploited, but when thousands or even millions of machines are simultaneously instructed to perform a joint, targeted attack, the damage can be immense.

Although we are used to thinking of botnets as a collection of computers, these networks can be comprised of various types of devices – personal computers, laptops, mobile devices, smart watches, security cameras, and smart house appliances.

Read More

Share this:

5 Ways Attackers Can Hack Your Email Account

 

When security personnel think of email attacks, usually the first word that comes to mind is “phishing." While phishing is a very common (and sadly, very successful) attack vector, many threat actors take a different approach to gaining access to victims’ accounts. Breaching an email mailbox is a critical first step, creating a doorway to endless exploitation possibilities.

In this blog post, we will outline five different ways that cyber attackers can breach your email account and steal personal information.

Read More

Share this:

ARCHIVES

see all

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter