1. IT-Security >
  2. Cyber Security Nachrichten >
  3. New Fake 'Eva Richter' Resume Spam Aims to Destroy Files


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

New Fake 'Eva Richter' Resume Spam Aims to Destroy Files

RSS Kategorie Pfeil IT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink öffnen

A new spam campaign is underway that pretends to be a job application from "Eva Richter" who is sending her photo and resume. This resume, though, is actually an executable masquerading as a PDF file that destroys a victim's files by installing the Ordinypt Wiper. [...]...

Webseite öffnen Komplette Webseite öffnen

Newsbewertung

Kommentiere zu New Fake 'Eva Richter' Resume Spam Aims to Destroy Files






Ähnliche Beiträge

  • 1. Malcolm - A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For Full Packet Capture Artifacts (PCAP Files) And Zeek Logs vom 247.43 Punkte ic_school_black_18dp
    Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind: Easy to use – Malcolm accepts network traffic data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be
  • 2. Strategies To Fight Email Spam! vom 125.01 Punkte ic_school_black_18dp
    Strategies To Fight Email Spam! ​ #SpamFilterService #HostedSpamFilter #SpamBlocker #AntiSpamService ​ If you are a business owner and you rely on email, spam is going to be a major concern. How you address it can make a big difference in employee effic
  • 3. Strelka - Scanning Files At Scale With Python And ZeroMQ vom 122.67 Punkte ic_school_black_18dp
    Strelka is a real-time file scanning system used for threat hunting, threat detection, and incident response. Based on the design established by Lockheed Martin's Laika BOSS and similar projects (see: related projects), Strelka's purpose is to perform
  • 4. Celerystalk - An Asynchronous Enumeration and Vulnerability Scanner vom 113.06 Punkte ic_school_black_18dp
    celerystalk helps you automate your network scanning/enumeration process with asynchronous jobs (aka tasks) while retaining full control of which tools you want to run. Configurable - Some common tools are in the default config, but you can add any tool you
  • 5. Huawei P9 ION Memory Management Uninitialized Memory Information Disclosure vom 112.21 Punkte ic_school_black_18dp
    Es wurde eine problematische Schwachstelle in Huawei P9 bis EVA-AL10C00B192/EVA-DL10C00B192/EVA-TL10C00B192/EVA-CL10C00B192 entdeckt. Dabei betrifft es eine unbekannte Funktion der Komponente ION Memory Management. Dank der Manipulation mit einer unbeka
  • 6. Azure Marketplace new offers–Volume 40 vom 108.59 Punkte ic_school_black_18dp
    We continue to expand the Azure Marketplace ecosystem. For this volume, 212 new offers successfully met the onboarding criteria and went live. See details of the new offers below: Applications 2Care: 2CARE is a healthcare solution that easily captures th
  • 7. TA18-074A: Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors vom 104.06 Punkte ic_school_black_18dp
    Original release date: March 15, 2018Systems Affected Domain ControllersFile ServersEmail ServersOverview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bur
  • 8. Cant install npm without node-gyp vom 98.19 Punkte ic_school_black_18dp
    Hi! I wanted to install eva-icons (https://www.npmjs.com/package/eva-icons) with command: npm i eva-icons but i got error Command 'npm' not found, but can be installed with: sudo apt install npm So I used sudo apt install npm And then I got this er
  • 9. TA17-293A: Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors vom 97.84 Punkte ic_school_black_18dp
    Original release date: October 20, 2017 | Last revised: October 23, 2017Systems Affected Domain ControllersFile ServersEmail ServersOverview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Securi
  • 10. New Research: Keeping fake listings off Google Maps vom 93.92 Punkte ic_school_black_18dp
    Posted by Doug Grundman, Maps Anti-Abuse, and Kurt Thomas, Security & Anti-Abuse ResearchGoogle My Business enables millions of business owners to create listings and share information about their business on Google Maps and Search, making sure everythi
  • 11. How Much Internet Traffic Is Fake? Turns Out, a Lot of It, Actually. vom 92.76 Punkte ic_school_black_18dp
    Long-time Slashdot reader AmiMoJo shared this article from New York magazine: In late November, the Justice Department unsealed indictments against eight people accused of fleecing advertisers of $36 million in two of the largest digital ad-fraud operations
  • 12. New Web App Uses Machine Learning To Analyze, Repair Your Technical Resume vom 86.95 Punkte ic_school_black_18dp
    CV Compiler is a new web app that uses machine learning to analyze and repair your technical resume, "allowing you to shine to recruiters at Google, Yahoo and Facebook," reports TechCrunch. "The app essentially checks your resume and tells you what to