Threats, Malware

Trickbot variant using fake shipping info in the wild

May 20, 2019
  • Be wary of telltale signs of spam such as suspicious sender addresses and glaring grammatical errors.
  • Refrain from opening email attachments from unverified sources.
  • Keep comprehensive logs of what happens within the network, which allows IT personnel to track suspicious activities like traffic from malicious URLs.
  • Monitor the network for potential threats, which can help an organization to identify malicious activities that traditional security solutions might not be able to detect.
prestitial ad