Category: EN

1-15 January 2025 Cyber Attacks Timeline

In the first timeline of January 2025, I collected 109 events with a threat landscape dominated by malware with 18%, down from 33% of the previous timeline, and once again ahead of account takeovers with 17% (it was 20% in…

AI vs. the Human Mind: The New Ransomware Playbook

Ransomware has always relied on the psychological levers of fear, urgency, and shame to pressure victims. But the rules of engagement are changing.  Cybercriminals are leveraging AI to ratchet up the pressure with more convincing, manipulative techniques, using everything from…

5 Critical MSSP Tasks Streamlined By Threat Intelligence

Managed Security Service Providers (MSSPs) deliver outsourced cybersecurity services, focusing on monitoring, managing, and mitigating threats for organizations. Threat intelligence actionable data about potential cyber threats enhances their ability to predict, detect, and respond to attacks. Below are five critical…

Microsoft Dynamics 365 Customer Voice Phishing Scam

Overview: Check Point researchers have identified a new phishing campaign that exploits Microsoft’s “Dynamics 365 Customer Voice,” a customer relationship management software product. It’s often used to record customer calls, monitor customer reviews, share surveys and track feedback. Microsoft 365…