This is a phishing email, the embedded link does not go to a SharePoint site or contain any documents. Do not click on any links and delete this email. Thank you. Continue Reading
This is a phishing email, the embedded link does not go to a SharePoint site or contain any documents. Do not click on any links and delete this email. Thank you. Continue Reading
Phishing email which will take you to a Mail Center landing page and attempt to harvest your credentials. Do not enter any information or click any links in this email. Continue Reading
The FORCEDENTRY vulnerability was discovered last week by CitizenLab. This vulnerability allows attackers to craft malicious PDF files which the device then process and runs the attackers code, leading to data theft, impersonation and potential device takeover. This vulnerability exploits Apple’s image rendering library, CoreGraphics and requires no interaction from the user once the text… Continue Reading
This week Microsoft reported that they are seeing this vulnerability being actively exploited in the wild. The attacker crafts a Microsoft Office document which contains a malicious ActiveX control, that once installed, grants the attacker the same rights as the user who opened the document. This can allow the attacker to run code, install and… Continue Reading
New phish reported, 04/28/2021. Mail comes from a Jeremy Keifer in the From field and the email appears to be from some variation of share-drive-noreply@google.com. It is impersonating Kathryn Foster and claims to share a file from Sharepoint (it also has a typo and misspells “has”). Do not open this attachment or enter any information.… Continue Reading
Email sent from support@sericare.com with body that looks like below image. Please delete and ignore message. Continue Reading
Microsoft’s Patch Tuesday addressed 120 vulnerabilities. 17 are critical severity rated, with two zero days addressed. The first allows attackers to bypass security features to load files, and the second affects the Internet Explorer scripting engine, allowing attackers to execute code. Both zero days are actively exploited and one is publicly disclosed. Additional information can… Continue Reading