Tag: Documents
-
Document publishing sites leveraged in phishing attacks
Issuu, FlipSnack, Simplebooklet, and other digital document publishing sites have been exploited by threat actors to facilitate new …
-
Hackers Exploiting Popular Document Publishing Sites for Phishing Attacks
Threat actors are leveraging digital document publishing (DDP) sites hosted on platforms like FlipSnack, Issuu, Marq, Publuu, RelayTo, and …
-
Hackers Abuse Document Publishing (DDP) Websites to Launch Cyber Attacks
Threat actors have been observed hosting phishing documents on legitimate digital document publishing (DDP) sites as part of continuous …
-
Regula updates Document Reader SDK to reduce the risk of identity theft
The updated Regula Document Reader SDK can reliably validate the authenticity of an ID by verifying such optically variable features. The …
-
Ransomware Attackers Leak Sensitive Swiss Government Documents, Login Credentials
Sensitive Swiss federal government data, including classified documents and log in credentials, were leaked by the Play ransomware group …
-
Simple Yet Vital Tips to Send Documents Securely via Email
In the information age where knowledge equals money, securing business communications, especially through e-mails, is critical and very …
-
Beware of Phobos Ransomware Delivered via Office Document
Researchers discovered an Office document with a VBA script intended to spread the Phobos ransomware known as FAUST. The FAUST version can …
-
Beware of Weaponized Office Documents that Deliver VenomRAT
Since office documents are often used in business communications, hackers take advantage of this fact to disseminate malicious malware …
-
Building Trust & Security: How to Add E-Signatures to Your Documents
We have been relying on a pen to sign documents for centuries, but the situation has changed greatly in today’s digital age, allowing us …
-
New Nim-Based Malware Delivered via Weaponized Word Document
Hackers use weaponized Word documents to deliver malicious payloads through social engineering. By embedding malware or exploiting …
-
Operation RusticWeb Using PowerShell Commands to Exfiltrate Confidential Documents
Hackers use PowerShell commands because they provide a powerful scripting environment on Windows systems, allowing them to stealthily …
-
Decoy Microsoft Word Documents Used to Deliver Nim-Based Malware
A new phishing campaign is leveraging decoy Microsoft Word documents as bait to deliver a backdoor written in the Nim programming language. …
●●●