Close Menu
New York Examiner News

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Weezer Play Acoustic Rooftop Set in Venice Beach

    March 29, 2026

    She quit VC to replace the underwire bra. Now she’s Nordstrom’s fastest-growing brand

    March 29, 2026

    Enormous Crowd Of Over 200,000 Show Up For No Kings Protest In Minnesota

    March 29, 2026
    Facebook X (Twitter) Instagram
    New York Examiner News
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    New York Examiner News
    Home»Technology»Security News This Week: US Energy Firm Targeted With Malicious QR Codes in Mass Phishing Attack
    Technology

    Security News This Week: US Energy Firm Targeted With Malicious QR Codes in Mass Phishing Attack

    By AdminAugust 19, 2023
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Security News This Week: US Energy Firm Targeted With Malicious QR Codes in Mass Phishing Attack


    At the Defcon security conference in Las Vegas last weekend, thousands of hackers competed in a red-team challenge to find flaws in generative AI chat platforms and help better secure these emerging systems. Meanwhile, researchers presented findings across the conference, including new discoveries about strategies to bypass a recent addition to Apple’s macOS that is supposed to flag potentially malicious software on your computer. 

    Kids are facing a massive online scam campaign that targets them with fake offers and promotions related to the popular video games Fortnite and Roblox. And the racket all traces back to one rogue digital marketing company. The social media platform X, formerly Twitter, has been filing lawsuits and pursuing a strategic legal offensive to oppose researchers who study hate speech and online harassment using data from the social network.

    On Thursday, an innovation agency within the US Department of Health and Human Services announced plans to fund research into digital defenses for health care infrastructure. The goal is to rapidly develop new tools that can protect US medical systems against ransomware attacks and other threats.

    But wait, there’s more! Each week, we round up the stories we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

    A large phishing campaign that’s been active since May has been targeting an array of companies with malicious QR codes in attempts to steal Microsoft account credentials. Notably, researchers from the security firm Cofense observed the attacks against “a major Energy company based in the US.” The campaign also targeted organizations in other industries, including finance, insurance, manufacturing, and tech. Malicious QR codes were used in nearly a third of the emails reviewed by researchers. QR codes have disadvantages in phishing, since victims need to be compelled to scan them for the attack to progress. But they make it more difficult for victims to evaluate the trustworthiness of the URL they’re clicking on, and it’s more likely that emails containing a QR code will reach their target, because it’s more difficult for spam filters to assess QR images included in an attachment like a PDF.

    It’s common practice for attackers—both criminal actors and state-backed hackers—to scam or otherwise lure victims from a starting point of mainstream services like email, photo sharing, or social media. Now, research from the security firm Recorded Future attempts to categorize the types of malware most often distributed from these various jumping-off points, and which strategies are most common. The goal was to give defenders deeper insight into the services they need to prioritize securing. The review found that cloud platforms are the most used by attackers, but communication platforms like messaging apps, email, and social media are also widely abused. Pastebin, Google Drive, and Dropbox were all popular among attackers, as are Telegram and Discord.

    In response to the “Downfall” Intel processor vulnerability disclosed by Google researchers last week, organizations have been releasing tailored fixes for the flaw. The bug could be exploited by an attacker to grab sensitive information like login credentials or encryption keys. Amazon Web Services, Google Cloud, Microsoft Azure, Cisco, Dell, Lenovo, VMWare, Linux distributions, and many others have all released guidance on responding to the vulnerability. Prior to public disclosure, Intel spent a year developing fixes to distribute across the industry and coordinating to encourage widespread patch release from individual vendors. 



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleQuantum computers: IBM has just made error correction easier
    Next Article Never Trust a Bushie: GW’s Attorney General Alberto Gonzales Says Trump Should Spend Time in Prison if Convicted by Far-Left Juries on Junk Charges | The Gateway Pundit

    RELATED POSTS

    Bluesky leans into AI with Attie, an app for building custom feeds

    March 29, 2026

    What Is the Best Garmin Watch Right Now? (2026)

    March 28, 2026

    Whoop has LeBron – now it wants your mom

    March 28, 2026

    AI Research Is Getting Harder to Separate From Geopolitics

    March 27, 2026

    David Sacks is done as AI czar — here’s what he’s doing instead

    March 27, 2026

    How Trump’s Plot to Grab Iran’s Nuclear Fuel Would Actually Work

    March 26, 2026
    latest posts

    Weezer Play Acoustic Rooftop Set in Venice Beach

    Weezer staged an acoustic rooftop concert in Venice Beach on Friday as part of a…

    She quit VC to replace the underwire bra. Now she’s Nordstrom’s fastest-growing brand

    March 29, 2026

    Enormous Crowd Of Over 200,000 Show Up For No Kings Protest In Minnesota

    March 29, 2026

    Ted Cruz stays neutral in Texas Senate runoff between Cornyn and Paxton

    March 29, 2026

    Bluesky leans into AI with Attie, an app for building custom feeds

    March 29, 2026

    At Gaza’s Al-Shifa Hospital, the War Isn’t Over

    March 29, 2026

    Kim Novak Slams Sydney Sweeney Casting in ‘Scandalous!’ Movie

    March 29, 2026
    Categories
    • Books (1,150)
    • Business (6,054)
    • Events (40)
    • Film (5,990)
    • Lifestyle (4,094)
    • Music (6,099)
    • Politics (6,054)
    • Science (5,407)
    • Technology (5,984)
    • Television (5,671)
    • Uncategorized (6)
    • US News (6,042)
    popular posts

    Our All-Time Favorite Parodies From the MTV Movie & TV Awards (VIDEO)

    The 2022 MTV Movie & TV Awards will mark the 30th time that MTV hands…

    OUTRAGEOUS! 75-Year-Old Pro-Life Activist with ‘Significant Health Issues’ Convicted For Peacefully Protesting Abortion Clinic – Faces Up to 11 Years in Prison | The Gateway Pundit

    November 21, 2023

    ‘RHOBH’ Mauricio Umansky Ditches GF For Mystery Blonde

    December 18, 2024

    Republican Rep. Accused of ‘Reconnaissance Tour’ Wants To Investigate Jan. 6 Committee If GOP Wins In 2022

    July 23, 2022
    Archives
    Browse By Category
    • Books (1,150)
    • Business (6,054)
    • Events (40)
    • Film (5,990)
    • Lifestyle (4,094)
    • Music (6,099)
    • Politics (6,054)
    • Science (5,407)
    • Technology (5,984)
    • Television (5,671)
    • Uncategorized (6)
    • US News (6,042)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    At Gaza’s Al-Shifa Hospital, the War Isn’t Over

    March 29, 2026

    Kim Novak Slams Sydney Sweeney Casting in ‘Scandalous!’ Movie

    March 29, 2026

    ‘Duck Dynasty’ Drama as John Luke Robertson Is Cuffed & Stuffed by Cops

    March 29, 2026
    © 2026 New York Examiner News. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT