PROCIRCULAR BLOG

Educating your business on the importance of cybersecurity

Dawson Medin

Recent Posts

How to Spot and Stop Today's Malicious Emails

Posted by Dawson Medin on May 3, 2021 9:35:29 AM
Phishing Attacks
During a phishing attack , attackers use social engineering and malicious emails to steal valid credentials from users. Attackers can use these credentials to begin more complicated attacks, or they can bundle and sell them to other cybercriminals . The attacker s lie about their identity and objectives to collect login information from unassuming victims or to get them to download malicious content . These emails might ask you to enter your password into a spoofed login page or send that information directly back to the sender . Although these scams are well - known, they are occasionally hard to spot, and they have a high rate of success . If you don’t encounter many of these emails, they may be caught in your junk folder. If this is the case, your email filtering is working effectively and removing potentially harmful phishing attempts. There is no reason to recover phishing emails from a junk folder.
 
Extortion Attacks
Extortion emails work a little differently . In this increasingly popular type of attack, the hackers claim to already have access to some sensitive information. That information could include anything from login credentials to embarrass ing photo s. Whatever they choose is something designed to prompt an urgent and desperate reaction from the recipient. In the email, they lay out what they have against their target, then threaten to blackmail them for money.
These types of emails are des igned to be scary. They are supposed to make the victim feel so frantic that they act without thinking. If you ever receive a threatening extortion email, remain calm and report it t hrough the proper channels. In this post, we’ll break down a poorly writte n extortion email that was sent to my junk folder.
Read More

Topics: Information Security, Data Protection, Personal Data Protection

LLMNR & NBT-NS Spoofing

Posted by Dawson Medin on Apr 30, 2019 2:09:00 PM

During a penetration test, we’ve found that a common (and easy) way to gather credentials and gain an initial foothold on the client’s network is to perform a Man-in-the-Middle poisoning attack abusing LLMNR & NBT-NS. Depending on how active users are on the network, this attack can give an adversary valuable information almost immediately. Fortunately, with a little knowledge, this attack can be easily remediated.

What is LLMNR & NBT-NS? 

Read More

Topics: Cybersecurity, Network Security, Information Security, hacking

  • There are no suggestions because the search field is empty.

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates