BEGIN:VCALENDAR PRODID:-//Microsoft Corporation//Outlook 16.0 MIMEDIR//EN VERSION:2.0 METHOD:PUBLISH X-MS-OLK-FORCEINSPECTOROPEN:TRUE BEGIN:VTIMEZONE TZID:AUS Eastern Standard Time BEGIN:STANDARD DTSTART:16010401T030000 RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4 TZOFFSETFROM:+1100 TZOFFSETTO:+1000 END:STANDARD BEGIN:DAYLIGHT DTSTART:16011007T020000 RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=10 TZOFFSETFROM:+1000 TZOFFSETTO:+1100 END:DAYLIGHT END:VTIMEZONE BEGIN:VEVENT CLASS:PUBLIC CREATED:20190301T124728Z DESCRIPTION:Cyber Extortion: The Newest Trend in Phishing\nBenny Ketelslege rs (Threat Researcher\, Talos) hosted by Liana Nio (Cybersecurity Marketin g Manager\, ANZ)\n \nLast year\, Cisco Talos observed attackers increasing ly spreading sextortion-type attacks across the internet. In many cases th e spammers harvested email addresses and passwords from a publicly availab le data breach\, and then used this data to facilitate their sextortion at tacks. When these kinds of spam campaigns make it into users' email inboxe s\, many of them may not be educated enough to identify that it's a scam d esigned to make them give away their bitcoins. Unfortunately\, it is clear from the large amount of bitcoin these actors secured that there is still a long way to go in terms of educating potential victims.\n DTEND;TZID="AUS Eastern Standard Time":20190308T113000 DTSTAMP:20190301T124728Z DTSTART;TZID="AUS Eastern Standard Time":20190308T111000 LAST-MODIFIED:20190301T124728Z LOCATION:https://www.cisco.com/c/m/en_au/ciscolive/security/index.html PRIORITY:5 SEQUENCE:0 SUMMARY;LANGUAGE=en-au:Cyber Extortion: The Newest Trend in Phishing TRANSP:OPAQUE UID:040000008200E00074C5B7101A82E0080000000070F89AA186D0D401000000000000000 010000000F3AE31DAF06C0E4FBE236DFE1B4A52C7 X-ALT-DESC;FMTTYPE=text/html:

Cyber Extortion: The Newest Tre nd in Phishing

Benny Ketelslegers (Threat Researcher\, Talos) hosted by Liana Nio (Cyber security Marketing Manager\, ANZ)

 \;

Last y ear\, Cisco Talos observed attackers \;incre asingly spreading \;sextortion-type attacks across the internet. In ma ny cases the \;spammers \;harvested email addresses and passwords from a publicly available data breach\, and then used this data to facilit ate their sextortion attacks. \;When these kinds of spam campaigns make i t into users' email inboxes\, many of them may not be educated enough to i dentify that it's a scam designed to make them give away their bitcoins. U nfortunately\, it is clear from the large amount of bitcoin these actors s ecured that there is still a long way to go in terms of educating potentia l victims.

X-MICROSOFT-CDO-BUSYSTATUS:BUSY X-MICROSOFT-CDO-IMPORTANCE:1 X-MICROSOFT-DISALLOW-COUNTER:FALSE X-MS-OLK-AUTOFILLLOCATION:FALSE X-MS-OLK-CONFTYPE:0 BEGIN:VALARM TRIGGER:-PT15M ACTION:DISPLAY DESCRIPTION:Reminder END:VALARM END:VEVENT END:VCALENDAR