Tag: social engineering techniques

  • Unit 42: Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon

    Source URL: https://unit42.paloaltonetworks.com/qr-code-phishing/ Source: Unit 42 Title: Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon Feedly Summary: Phishing with QR codes: New tactics described here include concealing links with redirects and using Cloudflare Turnstile to evade security crawlers. The post Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon appeared first on Unit 42.…

  • Microsoft Security Blog: Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/03/13/phishing-campaign-impersonates-booking-com-delivers-a-suite-of-credential-stealing-malware/ Source: Microsoft Security Blog Title: Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware Feedly Summary: Starting in December 2024, leading up to some of the busiest travel days, Microsoft Threat Intelligence identified a phishing campaign that impersonates online travel agency Booking.com and targets organizations in the hospitality industry. The…

  • Unit 42: Beneath the Surface: Detecting and Blocking Hidden Malicious Traffic Distribution Systems

    Source URL: https://unit42.paloaltonetworks.com/?p=138517 Source: Unit 42 Title: Beneath the Surface: Detecting and Blocking Hidden Malicious Traffic Distribution Systems Feedly Summary: A topological analysis and case studies add nuance to a study of malicious traffic distribution systems. We compare their use by attackers to benign systems. The post Beneath the Surface: Detecting and Blocking Hidden Malicious…

  • CSA: Cloud Security in Five Key Steps

    Source URL: https://www.tenable.com/blog/how-to-protect-your-cloud-environments-and-prevent-data-breaches Source: CSA Title: Cloud Security in Five Key Steps Feedly Summary: AI Summary and Description: Yes **Summary:** The text addresses the rapidly evolving landscape of cloud computing security, highlighting the increased risks associated with cloud adoption and providing actionable strategies for organizations to bolster their defenses. It emphasizes the necessity of a…