Blog
![](/sites/default/files/styles/resource_image/public/2021-03/Drake%20Img.jpg?itok=Jq4PgOTO)
A malware campaign using PowerPoint as the infection vector caught our eye after we noticed it contained lyrics to a popular Drake song hidden inside a PowerShell command. Depending on the victim, it either dropped the Lokibot info stealer or Azorult remote access trojan.
Read more![](/sites/default/files/styles/resource_image/public/2021-08/O365_resize.jpg?itok=vnTAF3Wy)
Digital attackers recently launched a phishing campaign that uses a malicious Microsoft Office 365 app to hijack users’ accounts.
Read more![](/sites/default/files/styles/resource_image/public/2021-03/image%20%2811%29.png?itok=1NzSWKXQ)
Digital criminals frequently made headlines in 2019 by directing their attack campaigns against organizations in education,
Read more![](/sites/default/files/styles/resource_image/public/2021-03/image%20%2810%29_0.png?itok=F-8jLWJB)
The California Consumer Privacy Act went into effect on Jan. 1, 2020. Now that this game-changing piece of cybersecurity legislation has become law, companies need to get serious about the details.
Read more![](/sites/default/files/styles/resource_image/public/2021-03/City-Hall.jpg?itok=4qlhhunv)
In recent years, we've seen high-profile cyberattacks directed at national governments in service of a political agenda. Now, in an unfortunate but predictable development, hackers are targeting state and local governments, and their motives are purely about profit.
Read more![](/sites/default/files/styles/resource_image/public/2021-03/image%20%288%29%20%281%29.png?itok=ceo766bg)
Researchers have identified a phishing campaign that leverages 3 different malicious kits to target high-profile companies with fake notifications of voicemails.
Read more![](/sites/default/files/styles/resource_image/public/2021-03/image%20%287%29%20%281%29.png?itok=8UzmqlPM)
The Cybersecurity and Infrastructure Security Agency (CISA) has warned users to be on the lookout for email-based scams and other attacks this holiday season.
Read more![](/sites/default/files/styles/resource_image/public/2021-03/image%20%286%29%20%281%29.png?itok=AoZrUDRG)
Archiving just makes sense for today’s businesses. Regulations affecting many sectors mandate that all or most communications be saved for prescribed periods.
Read more![](/sites/default/files/styles/resource_image/public/2021-03/image%20%285%29%20%281%29.png?itok=nDba-Zn5)
Given their line of work, it’s no wonder that financial organizations are a preferred target among digital criminals. Boston Consulting Group observes as much in a report finding that financial organiz
Read more![](/sites/default/files/styles/resource_image/public/2021-03/image%20%284%29%20%281%29.png?itok=HtH7r8jA)
Digital attackers are using a phishing campaign to target taxpayers located in the United States with the Amadey botnet. First detected by Cofense in mid-September 2019, the attack begins when a user receives an email purporting to originate from U.S. Internal Revenue Service (IRS).
Read more![](/sites/default/files/styles/resource_image/public/2021-03/Ransomware.jpg?itok=elSiHc95)
This article originally appeared on the AppRiver blog.
Read more![](/sites/default/files/styles/resource_image/public/2021-03/image%20%282%29%20%281%29.png?itok=u1kF-9eX)
In mid-March 2019, an unparalleled event sent shock waves through the world’s information infrastructure: Facebook went offline for 14 hours. Insert audible gasp here.
Read more