Latest phishing publications
Do you know how many people have access to your businesses core systems? Chances are it’s more than you think, and the bad news is that every one of them represents a potential entry point for cybercriminals.
Attackers continue to use the same methods that worked for them long before 2020: find a way in, then target privileged access to unlock doors.
Whether its organised cyber-criminals for whom the current health crisis has just broadened their attack landscape, or malevolent opportunistic hackers with time on their hands, there’s no doubting the rise in malware attacks in recent weeks. Every day we are seeing reports of phishing and hacking attempts which have grown with the enforcement of remote working. Sad as it is to acknowledge, despite every kind deed we witness during this period, the world is full of people with no good intent and we are inadvertently opening the backdoor and inviting them in. What is more, we can stop this, and we need to do it now.
People have been warned not to fall for a bogus text message saying they have been fined for stepping outside during the coronavirus lockdown. The latest in a series of scams related to the virus claims to be from the Government, telling the recipient their movements have been monitored through their phone and they must pay a fine or face a more severe penalty, the Chartered Trading Standards Institute (CTSI) said.
As more workers rush to adopt remote working technologies such as cloud-based teleconferencing or collaboration tools, cyber security companies have been quick to identify the ways in which hackers might exploit the situation to compromise users.
The latest company to do so is Check Point Software, whose researchers have penned a fresh blog post detailing how cyber hackers are taking advantage of surging demand for Zoom, conferencing software that has become a household name in recent weeks.