Uptick is Phishing from SharePoint and Teams: What you should know. What we’re doing about it.

We hope this message finds you well. We wanted to bring to your attention an emerging security concern that has been affecting a number of Office365 users. There has been a significant uptick in phishing attempts that seem to originate from legitimate SharePoint links and Microsoft Teams chat requests. These deceptive attempts are the result of compromised Office365 accounts. To ensure the security of your data and prevent your employees from falling victim to such scam emails, it's crucial to understand and recognize the warning signs. Here are the clear red flags to watch out for: Unknown File Sharer: If you cannot identify who shared the file with you, it's best to err on the side of caution. Always avoid opening files from unknown or suspicious sources. Vague File Details: If a file is shared without any prior context or an explanation of its content and purpose, consider it a…

Comments Off on Uptick is Phishing from SharePoint and Teams: What you should know. What we’re doing about it.

Critical Path Security and Ryan Vargas to compete in the NASCAR Whelen Euro Series – Circuit Zolder!

🏁 Exciting News! 🌍 At Critical Path Security, we're thrilled to share some exhilarating developments with you. As we expand our services into more areas around the world, we're also gearing up for an incredible racing adventure with NASCAR driver Ryan Vargas. On October 14-15, 2023, we'll be at Circuit Zolder in Belgium, accompanying Ryan Vargas as he immerses himself in two distinct NASCAR cultures. It's all part of our commitment to excellence, whether on the cybersecurity front or the racetrack. In Belgium, Ryan will be taking the wheel of the No. 30 Critical Path Security Chevrolet Camaro, competing in the NASCAR Whelen Euro Series event. This marks the culmination of a groundbreaking collaboration between Team FJ and 3F Racing in the EuroNASCAR PRO division, showcasing his adaptability and talent. This global journey encapsulates the contrast between the precision of European racing and the adrenaline rush of other NASCAR events,…

0 Comments

The Dangers of SIM Swapping: What You Need to Know

SIM swapping, or SIM hijacking, is a cybercrime tactic where attackers exploit vulnerabilities in mobile carrier processes to seize control of a victim's phone number. With this control, they intercept calls, text messages, and two-factor authentication (2FA) codes, gaining unauthorized access to sensitive accounts and personal information. As eSIM technology becomes more prevalent, the risks have escalated, making proactive security measures essential. How SIM Swapping Works Information Gathering Attackers collect personal details through phishing, social engineering, or dark web data purchases. Publicly shared information, like that found on social media or forums, can also be exploited. Carrier Manipulation Using the stolen data, attackers impersonate the victim and convince the mobile carrier to transfer the victim's number to a new SIM card or eSIM. Exploitation Once the transfer is complete, attackers intercept 2FA codes, enabling unauthorized access to banking, email, and social media accounts. What Makes eSIMs a Target? Unlike traditional…

0 Comments

Announcement: Promotion of Stacy Harris

We are delighted to announce the promotion of Stacy Harris from the position of Information Security Analyst to Information Security Manager. Drawing from his commendable military leadership service, Stacy has consistently demonstrated the tenacity, dedication, and skill set required for this elevated role. In his new position, he will be managing our infrastructure and leading our information security teams. We are confident that with his military background and professional expertise, Stacy will guide our teams to greater heights. Please join us in congratulating Stacy on this well-deserved promotion!

0 Comments