Mike Kosak's profile photo

Mike Kosak

Writer at SC Media

Senior Principal Intelligence Analyst at LastPass Blog

Articles

  • 3 weeks ago | blog.lastpass.com | Mike Kosak

    Last November, the Australian Signals Directorate’s (ASD) Australian Cyber Security Centre (ACSC) published its Annual Cyber Threat Report for 2023-2024. The report summarizes the cyber threat environment facing the public and private sectors, as well as private households. The data includes trends and information on threat actor tactics and techniques as well as recommended actionablesteps organizations and individuals can take to help mitigate these threats.

  • 1 month ago | darkreading.com | Mike Kosak

    COMMENTARYIt's no secret within the information security industry that advanced persistent threat (APT) naming conventions have gotten out of control. They're also a growing source of frustration. Every group has a list of increasingly outlandish names that make it hard enough to track a single group across multiple campaigns, let alone from one vendor report to the next.

  • Nov 13, 2024 | blog.lastpass.com | Mike Kosak

    LastPass would like to make our customers aware of a new SMS-based phishing (smishing) campaign targeting our customers. These texts are being sent from the phone number 833-479-4892 and include text stating the following: “[LastPass] We just blocked an unrecognized device from logging in.

  • Nov 4, 2024 | blog.lastpass.com | Mike Kosak

    Cybercriminals view U.S. presidential elections as a prime opportunity for notoriety and profit, using tactics like ransomware attacks, website take-downs, and software vulnerabilities. Security experts say these threats—already seen in the current election cycle—will likely persist beyond Election Day on November 5.

  • Oct 30, 2024 | blog.lastpass.com | Mike Kosak

    LastPass would like to make our customers aware of a current social engineering campaign leveraging fake reviews on our Chrome Web Store app page. A threat actor appears to besubmitting reviews where they direct customers to a fake number controlled by the threat actor. Examples of these Google Chrome Web Store app page posts and the phone number can be found below.