all attacksoriginatingfrom spear - phishing attempts
to get their targets to open an Adobe PDF attachment , which , taking advantage of an Adobe zero - day vulnerability , then can load Sykipot onto their computers , according to Alienvault 's research(passive) are designedThe spear - phishing attacks
to still rely on malicious macros hidden in files(passive) were discoveredSpear - phishing attempts
to a OneDrive linkleadsto a OneDrive link
the damage(passive) caused bythe damage
theft and loss(passive) caused bytheft and loss
to evade email securitydesignedto evade email security
to steal these credentialsdesignedto steal these credentials
to the installation of malware on a systemcan leadto the installation of malware on a system
from an already - hacked legitimate accountoriginatingfrom an already - hacked legitimate account
other accounts(passive) was caused byother accounts
to many information leakshave ledto many information leaks
A targeted or(passive) is designedA targeted or
alsocan ... leadalso
incidents and data breaches(passive) caused byincidents and data breaches
to the huge bitcoinledto the huge bitcoin
Most severe breaches(passive) are caused byMost severe breaches
to the theft of sensitive dataledto the theft of sensitive data
to many information leaks in recent yearshave ledto many information leaks in recent years
employees to open malicious attachmentscausingemployees to open malicious attachments
to compromised endpointscan quickly leadto compromised endpoints
massive health care industry breachesare causingmassive health care industry breaches
from an already - hacked legitimate account and watering hole domainsoriginatingfrom an already - hacked legitimate account and watering hole domains
to stolen credentials and BEC scamsleadingto stolen credentials and BEC scams
to attackers gaining administrative access to one systemledto attackers gaining administrative access to one system
in the world 's most populous countryoriginatedin the world 's most populous country
specifically for the popular micro blogging site Twitterdesignedspecifically for the popular micro blogging site Twitter
to trick the user into opening a malicious attachment or clicking on a malicious linkdesignedto trick the user into opening a malicious attachment or clicking on a malicious link
to gain access to employee credentials and deliver malwaredesignedto gain access to employee credentials and deliver malware
to drop malware on their systemsdesignedto drop malware on their systems
to trick them into downloading a malicious Google Chrome extensiondesignedto trick them into downloading a malicious Google Chrome extension
to some greater crimeto leadto some greater crime
to cyber criminals gaining access to sensitive dataleadsto cyber criminals gaining access to sensitive data
to distribute a piece of malware called GHOLEdesignedto distribute a piece of malware called GHOLE
in a data breach that would mean you or your CEO being the next executive explaining what happened in the headlines and on CNNwill resultin a data breach that would mean you or your CEO being the next executive explaining what happened in the headlines and on CNN
the damage(passive) caused bythe damage
problems for the governmenthas causedproblems for the government
other accounts(passive) was caused byother accounts
to breachledto breach
this breach(passive) is caused bythis breach
to identity theftcan ... leadto identity theft
high level network breaches(passive) caused byhigh level network breaches
to target specific individualsdesignedto target specific individuals