logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 1)
  • How the combination of XDR and SIEM can improve SOC operations
  • MOVEit Transfer zero-day was exploited by Cl0p gang (CVE-2023-34362)
  • Cybercriminals Exploit Legitimate Websites for Credit Card Theft
  • Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-33642 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33641 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33640 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33643 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33628 (magic_r300-2100m_firmware) 31 May 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Phishing: Hackers hide malware in James Webb image

Posted on 31 August 2022

From en.secnews.gr

phishing malware

Security investigators have discovered a new one malware distribution campaign which they called “GO#WEBBFUSCATOR” and is based on Phishing emails, malicious documents and… an image from space James Webb Telescope.

Read more…

Posted in News

Post navigation

Previous post: Russian streaming platform confirms data breach affecting 7.5M users
Next post: Three campaigns delivering multiple malware, including ModernLoader and XMRig miner
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.