From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud

Credit to Author: Paul Oliveria| Date: Tue, 12 Jul 2022 16:00:00 +0000

A large-scale phishing campaign that attempted to target over 10,000 organizations since September 2021 used adversary-in-the-middle (AiTM) phishing sites to steal passwords, hijack a user’s sign-in session, and skip the authentication process, even if the user had enabled multifactor authentication (MFA).

The post From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud appeared first on Microsoft Security Blog.

Read more

A Look Back at the 2018 Security Landscape

Credit to Author: Jon Clay (Global Threat Communications)| Date: Mon, 04 Mar 2019 15:00:20 +0000

Do you ever question the value of the mounds of data we all collect? We make a point to stop, analyze and share, especially because we know you might not have the time. So, I bring you our annual look back at the more interesting security events and trends seen last year. The report, Caught…

The post A Look Back at the 2018 Security Landscape appeared first on .

Read more

2019 Security Predictions Report Released

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Tue, 11 Dec 2018 13:05:01 +0000

What Makes For Really Good Security Predictions Each year Trend Micro releases its annual Security Predictions Report. Good security predictions are very difficult to develop, and companies and consumers need to be selective about the security advice they take. What makes a good security prediction? Four key aspects: 1. It is the prime directive that…

The post 2019 Security Predictions Report Released appeared first on .

Read more