Is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons.

Posts

Attackers use MS Office to Leak System Profile Data

The exploit affects Windows, iOS and Android. Spear phishing campaigns with the attachments are groundwork for future attacks.

Phishing emails promising invites to cybersecurity conference actually dispersing malware

Threat actors have been discovered trying to infect security-minded individuals with a trojan downloader by sending spear phishing emails that offer free invitations to Palo Alto Networks’ Cyber Security Summit in Jakarta, Indonesia. Source: SC Magazine Phishing emails promising invites to cybersecurity conference actually dispersing malware