Close Menu
New York Examiner News

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    ZAYN Announces 2026 “KONNAKOL” World Tour

    February 5, 2026

    Tech giants are shelling out up to $400k for AI evangelists to defend against skepticism

    February 5, 2026

    Kamala Harris rebrands 2024 HQ as progressive organizing hub for

    February 5, 2026
    Facebook X (Twitter) Instagram
    New York Examiner News
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    New York Examiner News
    Home»Technology»Security News This Week: US Energy Firm Targeted With Malicious QR Codes in Mass Phishing Attack
    Technology

    Security News This Week: US Energy Firm Targeted With Malicious QR Codes in Mass Phishing Attack

    By AdminAugust 19, 2023
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Security News This Week: US Energy Firm Targeted With Malicious QR Codes in Mass Phishing Attack


    At the Defcon security conference in Las Vegas last weekend, thousands of hackers competed in a red-team challenge to find flaws in generative AI chat platforms and help better secure these emerging systems. Meanwhile, researchers presented findings across the conference, including new discoveries about strategies to bypass a recent addition to Apple’s macOS that is supposed to flag potentially malicious software on your computer. 

    Kids are facing a massive online scam campaign that targets them with fake offers and promotions related to the popular video games Fortnite and Roblox. And the racket all traces back to one rogue digital marketing company. The social media platform X, formerly Twitter, has been filing lawsuits and pursuing a strategic legal offensive to oppose researchers who study hate speech and online harassment using data from the social network.

    On Thursday, an innovation agency within the US Department of Health and Human Services announced plans to fund research into digital defenses for health care infrastructure. The goal is to rapidly develop new tools that can protect US medical systems against ransomware attacks and other threats.

    But wait, there’s more! Each week, we round up the stories we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

    A large phishing campaign that’s been active since May has been targeting an array of companies with malicious QR codes in attempts to steal Microsoft account credentials. Notably, researchers from the security firm Cofense observed the attacks against “a major Energy company based in the US.” The campaign also targeted organizations in other industries, including finance, insurance, manufacturing, and tech. Malicious QR codes were used in nearly a third of the emails reviewed by researchers. QR codes have disadvantages in phishing, since victims need to be compelled to scan them for the attack to progress. But they make it more difficult for victims to evaluate the trustworthiness of the URL they’re clicking on, and it’s more likely that emails containing a QR code will reach their target, because it’s more difficult for spam filters to assess QR images included in an attachment like a PDF.

    It’s common practice for attackers—both criminal actors and state-backed hackers—to scam or otherwise lure victims from a starting point of mainstream services like email, photo sharing, or social media. Now, research from the security firm Recorded Future attempts to categorize the types of malware most often distributed from these various jumping-off points, and which strategies are most common. The goal was to give defenders deeper insight into the services they need to prioritize securing. The review found that cloud platforms are the most used by attackers, but communication platforms like messaging apps, email, and social media are also widely abused. Pastebin, Google Drive, and Dropbox were all popular among attackers, as are Telegram and Discord.

    In response to the “Downfall” Intel processor vulnerability disclosed by Google researchers last week, organizations have been releasing tailored fixes for the flaw. The bug could be exploited by an attacker to grab sensitive information like login credentials or encryption keys. Amazon Web Services, Google Cloud, Microsoft Azure, Cisco, Dell, Lenovo, VMWare, Linux distributions, and many others have all released guidance on responding to the vulnerability. Prior to public disclosure, Intel spent a year developing fixes to distribute across the industry and coordinating to encourage widespread patch release from individual vendors. 



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleQuantum computers: IBM has just made error correction easier
    Next Article Never Trust a Bushie: GW’s Attorney General Alberto Gonzales Says Trump Should Spend Time in Prison if Convicted by Far-Left Juries on Junk Charges | The Gateway Pundit

    RELATED POSTS

    9 Great Deals on WIRED-Approved Valentine’s Day Gifts (2026)

    February 5, 2026

    Sam Altman got exceptionally testy over Claude Super Bowl ads

    February 5, 2026

    A New AI Math Startup Just Cracked 4 Previously Unsolved Problems

    February 4, 2026

    Epstein-linked longevity guru Peter Attia leaves David Protein, and his own startup ‘won’t comment’

    February 4, 2026

    Upgrade Your Roku Before the Big Game

    February 3, 2026

    Fintech CEO and Forbes 30 Under 30 alum has been charged for alleged fraud

    February 3, 2026
    latest posts

    ZAYN Announces 2026 “KONNAKOL” World Tour

    ZAYN has announced “The KONNAKOL Tour,” his first first-ever solo run of headlining arena and…

    Tech giants are shelling out up to $400k for AI evangelists to defend against skepticism

    February 5, 2026

    Kamala Harris rebrands 2024 HQ as progressive organizing hub for

    February 5, 2026

    Trump defends Tulsi Gabbard FBI raid presence at Fulton County election office

    February 5, 2026

    9 Great Deals on WIRED-Approved Valentine’s Day Gifts (2026)

    February 5, 2026

    Katharine Burr Blodgett’s brilliant career began at the ‘House of Magic’

    February 5, 2026

    Prince Andrew’s Daughters Feel ‘Duped’ by Epstein Scandal Revelations

    February 5, 2026
    Categories
    • Books (1,045)
    • Business (5,949)
    • Events (31)
    • Film (5,886)
    • Lifestyle (3,996)
    • Music (5,989)
    • Politics (5,951)
    • Science (5,301)
    • Technology (5,880)
    • Television (5,564)
    • Uncategorized (6)
    • US News (5,938)
    popular posts

    Dave Grohl Spent Over 24 Hours Barbecuing For The Homeless During Winter Storm

    Dave Grohl is bringing out the best of Twitter after volunteering at a Los Angeles…

    Virtus’ Terranova dumps these two tech stocks, says he doesn’t trust the recent high-beta rally

    January 31, 2023

    Pokémon Game Following Entire Anime Is Saying Goodbye To Ash Too

    March 23, 2023

    What China’s Covid Crisis Means for the Rest of the World

    January 10, 2023
    Archives
    Browse By Category
    • Books (1,045)
    • Business (5,949)
    • Events (31)
    • Film (5,886)
    • Lifestyle (3,996)
    • Music (5,989)
    • Politics (5,951)
    • Science (5,301)
    • Technology (5,880)
    • Television (5,564)
    • Uncategorized (6)
    • US News (5,938)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    Katharine Burr Blodgett’s brilliant career began at the ‘House of Magic’

    February 5, 2026

    Prince Andrew’s Daughters Feel ‘Duped’ by Epstein Scandal Revelations

    February 5, 2026

    FENIX Rising Returns to The Bitter End on February 22nd with Sean Griffin and St. Divine

    February 5, 2026
    © 2026 New York Examiner News. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT