SIEM as a Service
Malicious PDF Microsoft 2FA Warning

Beware Of Malicious PDF Files That Mimic Microsoft 2FA Security Update

Malware authors are exploiting the growing popularity of QR codes to target users through PDF files, where these malicious PDFs, often delivered via email disguised as faxes, contain QR codes that trick users into...
Hackers Bypass SEGs With Sophisticated Malware Exploits

Hackers Bypass Secure Email Gateway With Sophisticated Malware Exploits

Hackers often attack Secure Email Gateways (SEGs) to bypass security measures and gain access to private communications. Once they have attacked SEGs, they can snoop on emails, change them or even start a phishing scheme...
Top Email Security Trends and Predictions for 2024

Top Email Security Trends and Predictions for 2024

In a digital world that is constantly evolving, we often find ourselves discussing online privacy and security. One of the most critical aspects of this broad topic is email security. Email security refers to...
Tricky OneDrive Phishing Campaign Tricks Users To Execute PowerShell Script

Tricky OneDrive Phishing Campaign Tricks Users To Execute PowerShell Script

A sophisticated phishing campaign targets Microsoft OneDrive users, employing social engineering to trick victims into executing malicious PowerShell scripts.  The attack leverages a false sense of urgency by claiming a DNS issue prevents file access,...
Critical XSS Vulnerability In Roundcube Let Attackers Execute Arbitrary Code

Critical XSS Vulnerability In Roundcube Let Attackers Execute Arbitrary Code

Roundcube, a widely adopted open-source webmail application, is included by default in the popular cPanel web hosting control panel, leading to millions of installations worldwide.  The software is commonly used by universities and government agencies,...
Microsoft 365 Flags Images Malware

Microsoft 365 Flags Users Email Messages Having Images Flagged as Malware

Microsoft 365 has acknowledged an issue affecting its Exchange Online service, where some users' email messages containing images are being incorrectly flagged as malware and quarantined. This problem, identified under Issue ID EX873252, has been...
How Phishing Messages Break Through Email Filters – Report

How Phishing Messages Break Through Email Filters – Report

Phishing remains a persistent danger. It's an email-based cyber threat through which threat actors target sensitive user credentials and distribute malware. More than 963,000 attacks were discovered recently in the APWG's Phishing Activity Trends Report...
Beware of Work Email Security Alert that Steals Your Login Credentials

Beware of Work Email Security Alert that Steals Your Login Credentials

A new phishing scam is targeting employees by exploiting their sense of responsibility and concern for email security. The attack begins with an email purportedly from "The Office 365 Team," alerting the recipient of...
North Korean APT Hackers Exploiting DMARC Misconfigs For Phishing Attacks

North Korean APT Hackers Exploiting DMARC Misconfigs For Phishing Attacks

DMARC is an email authentication protocol that helps domain owners protect against unauthorized use like "email spoofing" and "phishing attacks." By leveraging existing protocols like "SPF" and "DKIM," DMARC enables domain owners to publish policies...
Zendesk Email Spoofing Vulnerability

Zendesk Email Spoofing Flaw Let Attackers Gain Access To Support Tickets

A severe vulnerability in Zendesk, a widely used customer service tool, has been exposed, allowing attackers to gain unauthorized access to sensitive support tickets of numerous Fortune 500 companies. The flaw, discovered by a...
SIEM as a Service

Recent Posts