Oct. 13, 2023, 1:10 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news


					<div>
<div>
<div>
<div>
<div>
<p>By: Robert O’Callaghan</p><p>A method of communication that remains important in our modern world is that of the voice message. The PDC recently observed a phishing campaign where threat actors included an access key in the body as a way to entice the user to access the voice message that had been left for them to review.&nbsp;</p><p>In Figure 1, we can see the email notifying the user of the messages available.&nbsp;</p><p>We note the use of a …

access access keys adfs amp article campaign campaigns cofense compromise file hash indicators of compromise key keys link live name phishing phishing campaign voice voice phishing zoom

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC