Cloud

6/25/2018
11:42 AM
50%
50%

1.7 Million Phishing Emails Blocked in June: Barracuda Networks

Brand-name spoofing still a popular tactic to lure victims into giving up their login credentials and payment card information, new data shows.

Cybercriminals continue to go to phishing as their initial attack vector: Barracuda Networks alone has blocked more than 3.2 million phishing emails since May 1, according to the security firm. 

The email security firm filtered some 1.5 million phishing emails and more than 10,000 unique phishes in May, and already has blocked 1.7 million just in June, with more than 2,000 different phishes.

Among the types of phishes Barracuda spotted are those that pose as well-known brand name companies such as CitiBank, Key Bank, Netflix, and Wells Fargo, sending phony emails that try to fake the victim into visiting malicious links that steal their login credentials and payment information, for example.

Read more here

 

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
JayJKelleyIII
50%
50%
JayJKelleyIII,
User Rank: Author
6/27/2018 | 11:54:52 AM
Phishing is Pervasive
Phishing is pervasive, and seems to be never-ending. In order to stop phishing attacks in their tracks, enterprises, SMBs - for that matter, ANY sized business today needs to combine anti-phishing training with technology. Both are necessary to halt phishing attacks before they can be launched.
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Major International Airport System Access Sold for $10 on Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  7/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14373
PUBLISHED: 2018-07-17
An issue was discovered in LibTIFF 4.0.9. In TIFFFindField in tif_dirinfo.c, the structure tif is being dereferenced without first checking that the structure is not empty and has the requested fields (tif_foundfield). In the call sequences following from the affected library functions (TIFFVGetFiel...
CVE-2018-14374
PUBLISHED: 2018-07-17
An issue was discovered in LibTIFF 4.0.9. A buffer overflow can occur via an empty fmt argument to unixErrorHandler in tif_unix.c, and it can be exploited (at a minimum) via the following high-level library API functions: TIFFClientOpen, TIFFFdOpen, TIFFRawStripSize, TIFFCheckTile, TIFFComputeStrip,...
CVE-2018-14375
PUBLISHED: 2018-07-17
An issue was discovered in LibTIFF 4.0.9. A buffer overflow vulnerability can occur via an invalid or empty tif argument to TIFFRGBAImageOK in tif_getimage.c, and it can be exploited (at a minimum) via the following high-level library API functions: TIFFReadRGBAImage, TIFFRGBAImageOK, and TIFFRGBAIm...
CVE-2018-14378
PUBLISHED: 2018-07-17
An issue was discovered in LibTIFF 4.0.9. A buffer overflow can occur via an invalid or empty tif argument to TIFFWriteBufferSetup in tif_write.c, and it can be exploited (at a minimum) via the following high-level library API function: TIFFWriteTile.
CVE-2018-14363
PUBLISHED: 2018-07-17
An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict '/' characters that may have unsafe interaction with cache pathnames.