CIO.com/MEHow Middle East tech leaders can secure against virtual-event hacking (Story originated in ME)

“In a post describing the attacks, Tom Burt, Microsoft's corporate vice president for customer security and trust, said the attackers had been sending possible attendees spoofed invitations, which if clicked on, would take them to one of several known credential harvesting websites. The attacks against both the T20 Summit and Munich Security Conference were a blend of old school phishing attacks with advanced spear phishing to compromise an individual, notes Morey Haber, CTO and CISO of software company BeyondTrust. By making each attack customised to that attendee, the attackers were able to bypass basic scrutiny, and by guiding users to open a non-malicious PDF, they were able to bypass antivirus systems.”

Prefers reduced motion setting detected. Animations will now be reduced as a result.