A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys. They hacked into corporate emails, stole money from people and businesses, and tricked others into transferring the loot. Nigerian nationals Solomon Ekunke Okpe and Johnson Uke Obogo ran a sophisticated fraud scheme … More Tricks of the trade: How a cybercrime ring operated a multi‑level fraud scheme
Today’s kids are exposed to technology from an early age. Can new technology, specifically machine learning and artificial intelligence, actually help kids become more creative? These AI-powered models provide inspiration, generate ideas, and offer feedback that can help spark creativity and encourage kids to think outside the box. How can AI enhance children’s creative skills? … More How to boost children’s creativity with AI?
Help net security* reports phishers are using encrypted restricted-permission messages (.rpmsg) attached in phishing emails to steal Microsoft 365 account credentials. The phishing emails are sent from a compromised Microsoft 365 account to individuals working in the billing department of the recipient company. The emails contain a .rpmsg (restricted permission message) attachment and a “Read … More Phishers use encrypted file attachments to steal Microsoft 365 account credentials
Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business. Approximately one in seven people in Europe and the United States are self-employed, often realizing their dream to be in charge of their own destiny and having more freedom and control over their careers. But with nominally more freedom … More Digital security for the self‑employed: Staying safe without an IT team to help
Bleeping computer reports* that A new PowerShell-based malware dubbed PowerExchange was used in attacks linked to APT34 Iranian state hackers to backdoor on-premise Microsoft Exchange servers. After infiltrating the mail server via a phishing email containing an archived malicious executable, the threat actors deployed a web shell named ExchangeLeech (first observed by the Digital14 Incident … More New PowerExchange malware backdoors Microsoft Exchange servers