all InfoSec news
Attackers Use EvilProxy to target C-suite Executives
Aug. 11, 2023, 6:10 a.m. |
GovInfoSecurity.com RSS Syndication www.govinfosecurity.com
Threat actors are taking control of cloud-based Microsoft 365 accounts of C-suite executives using a multi-factor authentication phishing tool. Proofpoint researchers say attackers use automation to identify in real-time whether a phished user is a high-level profile company official.
accounts attackers attacks authentication automation cloud cloud-based control c-suite employees evilproxy executives factor high identify kit microsoft microsoft 365 multi-factor multi-factor authentication official phished phishing phishing kit profile proofpoint researchers target tool
More from www.govinfosecurity.com / GovInfoSecurity.com RSS Syndication
New Report Exposes Iranian Hacking Group's Media Masquerade
2 days, 19 hours ago |
www.govinfosecurity.com
How Intel 471's Buy of Cyborg Is Reshaping Threat Hunting
2 days, 19 hours ago |
www.govinfosecurity.com
Web Trackers Persist in Healthcare Despite Privacy Risks
2 days, 21 hours ago |
www.govinfosecurity.com
New Botnet 'Goldoon' Targets D-Link Devices
2 days, 21 hours ago |
www.govinfosecurity.com
Jobs in InfoSec / Cybersecurity
Consultant infrastructure sécurité H/F
@ Hifield | Sèvres, France
SOC Analyst
@ Wix | Tel Aviv, Israel
Information Security Operations Officer
@ International Labour Organization | Geneva, CH, 1200
PMO Cybersécurité H/F
@ Hifield | Sèvres, France
Third Party Risk Management - Consultant
@ KPMG India | Bengaluru, Karnataka, India
Consultant Cyber Sécurité H/F - Strasbourg
@ Hifield | Strasbourg, France