 
			
		Phishing with Google Apps Script
Scammers are using redirects through Google Apps Script to prevent mail servers from blocking phishing links.
492 articles
 
			
		Scammers are using redirects through Google Apps Script to prevent mail servers from blocking phishing links.
 
			
		Update all Windows systems immediately to patch CVE-2021-1675 and CVE-2021-34527 vulnerabilities in the Windows Print Spooler service.
 
			
		Attackers claiming to represent Adobe online services are sending fake notifications to obtain corporate e-mail credentials.
 
			
		To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
 
			
		Some network-attached storage from WD has been reset to factory settings, wiping users’ data. Here’s how to protect your WD NAS.
 
			
		Many companies throw out information that can pose a security or reputational risk.
 
			
		To bypass text-analysis mechanisms, attackers are distributing phishing letters in images. How to avoid the danger.
 
			
		Researchers discuss the new cybercriminal tactic of downloading outdated binaries onto modern computers and exploiting their vulnerabilities.
 
			
		At the 2021 RSA Conference, a panel of experts discusses the need for better collaboration in thwarting cybercrime.
 
			
		How to distribute patches on company computers without causing disruptions.
 
			
		Phishers are using Google online services to take over Microsoft online service accounts.
 
			
		 
			
		If an incoming message asks you to sign in to your MS Office account, here’s what to do.
 
			
		With a website that looks like it could represent an online service provider, DarkSide Leaks makes us wonder what cybercriminals’ other PR tricks might be.
 
			
		A zero-day vulnerability in Microsoft Windows may already have been exploited.
 
			
		 
			
		Unknown attackers tried to add a backdoor to PHP scripting language source code.
 
			
		Several cybercriminal groups have exploited vulnerabilities in VMware ESXi to infect computers with ransomware.
 
			
		To stop all threats to the corporate infrastructure, you have to do more than just protect workstations.
 
			
		A vulnerability in Google Chrome has already been exploited by malefactors. All users need to update to version 89.0.4389.90.
 
			
		Hackers trying to inflict maximum reputation damage are sending out links to the data they stole through Accellion FTA vulnerabilities.