Tag: email communication
-
Cisco Talos Blog: Abusing with style: Leveraging cascading style sheets for evasion and tracking
Source URL: https://blog.talosintelligence.com/css-abuse-for-evasion-and-tracking/ Source: Cisco Talos Blog Title: Abusing with style: Leveraging cascading style sheets for evasion and tracking Feedly Summary: Cascading Style Sheets (CSS) are ever present in modern day web browsing, however its far from their own use. This blog will detail the ways adversaries use CSS in email campaigns for evasion and…
-
Hacker News: Tuta Launches Post Quantum Cryptography for Email (2024)
Source URL: https://tuta.com/blog/post-quantum-cryptography Source: Hacker News Title: Tuta Launches Post Quantum Cryptography for Email (2024) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses Tuta Mail’s launch of TutaCrypt, a significant upgrade featuring a groundbreaking hybrid post-quantum encryption protocol designed to secure emails against future quantum computer attacks. This represents a pivotal…
-
Cisco Security Blog: Your Endpoint Is Secure Against AI Supply Chain Attacks
Source URL: https://feedpress.me/link/23535/16966965/your-endpoint-is-secure-against-ai-supply-chain-attacks Source: Cisco Security Blog Title: Your Endpoint Is Secure Against AI Supply Chain Attacks Feedly Summary: Beginning immediately, all existing users of Cisco Secure Endpoint and Email Threat Protection are protected against malicious AI Supply Chain artifacts. AI Summary and Description: Yes Summary: Cisco has taken a proactive step by enhancing its…
-
Microsoft Security Blog: New Star Blizzard spear-phishing campaign targets WhatsApp accounts
Source URL: https://www.microsoft.com/en-us/security/blog/2025/01/16/new-star-blizzard-spear-phishing-campaign-targets-whatsapp-accounts/ Source: Microsoft Security Blog Title: New Star Blizzard spear-phishing campaign targets WhatsApp accounts Feedly Summary: In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we track as Star Blizzard sending their typical targets spear-phishing messages, this time offering the supposed opportunity to join a WhatsApp group. This is the first…
-
Cisco Talos Blog: Malicious QR codes
Source URL: https://blog.talosintelligence.com/malicious_qr_codes/ Source: Cisco Talos Blog Title: Malicious QR codes Feedly Summary: QR codes are disproportionately effective at bypassing most anti-spam filters, as most filters are not designed to recognize that a QR code is present in an image and decode the QR code. According to Talos’ data, roughly 60% of all email containing…
-
Hacker News: Hackers now use ZIP file concatenation to evade detection
Source URL: https://www.bleepingcomputer.com/news/security/hackers-now-use-zip-file-concatenation-to-evade-detection/ Source: Hacker News Title: Hackers now use ZIP file concatenation to evade detection Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a new technique employed by hackers that utilizes concatenated ZIP files to deliver malicious payloads, evading detection by common security solutions. This emerging threat highlights the need…