Thirteen well-known corporate brands are being targeted in a phishing attack using SLK attachments with the goal of accessing their corporate networks, according to researchers.
Thirteen well-known corporate brands are being targeted in a phishing attack using SLK attachments with the goal of accessing their corporate networks, according to researchers.
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics
The SLK file indicates the criminal hackers are evolving their attack vectors to get people to click on the links and attachments to gain access to corporate networks. Curiosity certainly can peak someone\’s interest to open the Excel attachment to see what it contains, especially when it\’s the company name in the file.
It\’s important that organizations train and educate their employees to verify the sender of the emails, especially if they\’re outside of the company. Especially, when the email itself is unexpected or coming at unusual times of the day. While it may seem like a loss of productivity, users should take an extra moment to determine if the email was something they were expecting or unusual.