Be careful with LinkedIn! That job opportunity could be a cyberattack

Cybersecurity researchers have highlighted a new phishing campaign that is spreading through private messages on social media, especially on LinkedIn. This method allows attackers to build trust with high-value individuals before compromising their systems. According to a report from ReliaQuest, the campaign uses malicious files delivered through the technique of sideloading dynamic link libraries (DLL), combined with open-source Python pen-testing scripts. Don’t read your DMs from strangers, just in case The strategy involves approaching victims through messages on LinkedIn, inducing them to download an archive file […]

Cybersecurity researchers have highlighted a new phishing campaign that is spreading through private messages on social media, especially on LinkedIn. This method allows attackers to build trust with high-value individuals before compromising their systems. According to a report from ReliaQuest, the campaign uses malicious files delivered through the sideloading technique of dynamic link libraries (DLL), combined with open-source pen-testing Python scripts.

Don’t open your DMs from strangers, just in case

The strategy involves approaching victims through messages on LinkedIn, inducing them to download a self-extracting WinRAR file that, when executed, activates a chain of infection. In this process, several malicious components are extracted, where the execution of a PDF reader application triggers the malicious payload. This technique has become increasingly common among threat actors, as it allows them to conceal suspicious activities and evade detection.

Once the system is infected, attackers gain persistent remote access, allowing them to exfiltrate sensitive data and escalate privileges within the compromised network. ReliaQuest indicates that this activity is widespread and opportunistic, affecting various industries. The ease of use of legitimate tools and the abuse of social platforms highlight the growth of phishing attacks that go beyond traditional emails.

Previous experiences have shown that LinkedIn has been used for targeted attacks, with malicious actors posing as job opportunities. The lack of monitoring of private messages on these platforms presents a significant gap in organizational security postures, suggesting that companies should consider social media as a critical area of exposure to attacks and expand their defenses beyond the email-centric approach.

40% of ransomware problems end in physical threats to executives

In a recent report, Semperis revealed that 40% of ransomware incidents involve physical threats directed at executives, a tactic employed by criminals to pressure victims into complying with ransom demands. This alarming finding highlights a concerning shift in the evolution of cyberattacks, where violence and coercion are becoming common tools in the attackers’ repertoire. Ransomware, a type of cyberattack that kidnaps critical data and demands payment for its release, has been at the center of the debate about the […]

In a recent report, Semperis has revealed that 40% of ransomware incidents involve physical threats directed at executives, a tactic employed by criminals to pressure victims into complying with ransom demands. This alarming finding highlights a concerning shift in the evolution of cyberattacks, where violence and coercion are becoming common tools in the attackers’ repertoire.

What I put in you, milk

Ransomware, a type of cyberattack that kidnaps critical data and demands payment for its release, has been at the center of the cybersecurity debate for years. However, the inclusion of physical threats represents an extreme approach that not only intensifies fear but also raises serious concerns about the safety of executives and staff in the affected companies. As these attacks become more sophisticated, it is evident that criminals are willing to cross ethical and legal lines to achieve financial gains.

This increase in the violence associated with ransomware crimes is a wake-up call for organizations and authorities. The need to adopt more robust security measures and to promote a culture of prevention is more urgent than ever. Companies must be prepared not only to protect their data but also to safeguard the integrity of their personnel.

Moreover, in an environment where threats can extend beyond the digital world, it becomes essential for organizations to implement protocols that include physical security and training for their employees to deal with crisis situations. As the threat of ransomware continues to evolve, the commitment to security will be crucial to safeguard both the business infrastructure and the individuals that comprise it.

TrendMicro’s Antivirus for Mac goes way beyond malware

Even though Macs have a reputation for security, the number of malware attacks on Macs surpassed those on Windows machines for the first time in 2020, according to an article in Vox. So there goes the idea that if you have a Mac, you don’t have to worry about installing software to protect it. The fact is, hackers have gotten more devious in sidestepping the inbuilt protections in all our computers, so having an extra level of security – for Macs and PCs – is just plain smart.

AntiVirus for Mac from trusted software developer TrendMicro delivers this protection and much, much more.

Don’t be held hostage 

As with all antivirus software products out there, TrendMicro’s product will alert you when it finds malware on your Mac or when you attempt to download a potentially troublesome file. But Antivirus for Mac takes things a step further with enhanced ransomware protection. Called Folder Shield, this component of the program allows you to mark folders you want monitored so that if a hacker were to try to encrypt them and charge you money to un-encrypt them, he would be blocked and you would be notified.

Cruise the web with confidence

Antivirus for Mac also automatically plugs into your browsers when it is installed so that it can keep an eye out for suspicious websites and other online threats, which it identifies with an icon in search results. You are able to set your Web Threat Protection Level to low, medium or high, and you can also activate a website filter to block sites based on their themes/functions such as those that feature nudity, hate or racism, gambling, shopping, offer online chats, or provide streaming media. There are 31 filters in all, along with the ability to whitelist any site you’d like – a feature that comes in very handy if you have children surfing the internet.

Social distance

One of the standout features of Antivirus for Mac is the ability to have it examine your social media settings on Facebook, Twitter and LinkedIn for potential privacy concerns (although we couldn’t get this feature to work on Facebook in our tests). The scan will tell you what information you’re sharing with the public and recommend settings to help lock down your private information – including the information that’s shared with advertisers outside the social networks. 


Eye spy

Still another noteworthy feature of Antivirus for Mac is that you are able to set it to alert you whenever an application is trying to access your webcam or microphone to prevent unwanted spying. The setting is simple to activate during the installation process.

And speaking of simplicity, TrendMicro has made this program extremely easy to navigate. The main screen offers the various protection possibilities down the left and when you choose one, the window to the right is populated with the settings you can control. Things work with simple checkboxes and slidable switches, plus an icon in your Mac’s toolbar lets you quickly access key features including scans and updates.

Value time

TrendMicro’s antivirus, anti-malware, and anti-ransomware protections would be enough to make Antivirus for Mac a bargain on its own. Throw in all the features we’ve detailed, and it becomes clear that it’s hard to beat the value you get for your money. Right now the software is available for 25% off the normal rate of $39.95, so you’ll pay only $29.95 for a full year of protection.