While reviewing currently surging malware attacks back in January 2020, one in particular stood out: JS:Trojan:Cryxos.2550. Its appearances increased over 457% from the previous week. This isn’t a new malware by any means, as Trojan.Cryxos has been written about many times. However, this variant is rather new and since it’s surging, it is important to raise the question if you … [Read more...]
Netflix Phish, Take 2
Introduction and an Email Address Tip Trevor Collins recently blogged about a Netflix phishing attempt he caught on to. I received a phish-y Netflix email as well and I wanted to take the time to blog about the email to help add additional value of how to spot such emails. Earlier this week I also wrote about email spoofing and phishing, and what to look for in identifying … [Read more...]
How to Spot Spoofed or Phishing Emails on Your Mobile Device
Full disclaimer: spotting spoofed or phishing emails on a mobile device like a cell phone or a tablet isn’t as straightforward as on a laptop or desktop. As you’ll see shortly, mobile clients can hide a lot of the telltale signs of a phish. This post will use a spoofed email claiming to be from our CTO Corey Nachreiner, sent to Trevor and myself, with Marc cc’d. The main focus … [Read more...]
Healthcare Data Incident
In June 2019, The Methodist Hospitals, Inc. identified unusual activities within employee email accounts. They immediately started an investigation, working with third-party forensic investigators to assess the scope of the issue at hand. On August 7, 2019, the investigation revealed that two employees fell victim to a phishing email that allowed an unauthorized actor access to … [Read more...]
Set Employees Free with Security That Travels
With the average person managing 90 accounts that require a username and password, and credential-stealing malware on the rise, your users are firmly in the crosshairs of cyber criminals. At the same time, the drive toward workplace flexibility and desire to empower people to work where they are most comfortable challenges some foundations of cyber security. More work than ever … [Read more...]