Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
Voicemail message themed phishing emails showed an increase in July according to researchers. The objective of the emails is to have the recipient click the link to a recording of a voice message that was left for them. The emails are crafted to appear as if being automatically generated by the voice system. One of the emails analyzed led the recipient to a domain, named to appear as a Cisco domain, with the website pages mimicking those of a Cisco Unity Connection system and offered the victim a number of services to login with such as Gmail, Office 365, and Yahoo. Some of the emails led victims to a site which utilized Google’s reCAPTCHA service to prevent automated analysis of the phishing pages. In all the emails analyzed, JavaScript was used, and in some cases, external JavaScript files were used to render the HTML pages. Researchers notes that these campaigns are targeting enterprise users to obtain confidential data. Such data may be sold or may provide information to be used in further attacks to gain a foothold within the enterprise.