News

Compromised password blamed for pipeline hack, a new phishing scam arises... Experts insist that following the basic principles of cyber security will go a long way to lowering the odds of being victimized by an attacker. The latest proof is last month’s ransomware attack on Colonial Pipeline in the U.S. Hackers got in by exploiting a compromised username and password, according to an official of FireEye’s Mandiant threat intelligence service. Mandiant was called in to investigate the breach. The executive told Bloomberg News the password for a virtual private network account was no longer in use, but was still valid. That password was posted on the dark web, which raises the possibility a current or former Colonial employee used the same password on another account that had been hacked.
Read More
Colonial Pipeline Incident Sparks 'Help Desk' Phishing Attacks Researchers have discovered a new phishing campaign designed to spread ransomware and steal data by capitalizing on interest in the recent Colonial Pipeline outage. Security vendor Inky spotted the malicious emails, which said several Microsoft 365 customers were targeted.
Read More
Phishing Uses Colonial Pipeline Ransomware Lures to Infect Victims   The recent ransomware attack on Colonial Pipeline inspired a threat actor to create a new phishing lure to trick victims into downloading malicious files. The emails are targeted and tailored as urgent notifications to download and install a system update that would defend against the latest ransomware strains.
Read More
Hackers use Colonial pipeline ransomware news for phishing attack The emails ask employees to download a “ransomware update” that is actually malware. Cyberattackers are now using the notoriety of the Colonial Pipeline ransomware attack to leverage further phishing attacks, according to the findings of a cybersecurity company.  It is common for attackers to use widely-covered news events to get people to click on malicious emails and links, and cybersecurity firm INKY said it recently received multiple helpdesk emails about curious emails their customers were receiving. 
Read More
INKY Technology Announces Launch of Channel Partner Program Program Provides Managed Security Providers and Value-Added Resellers with Access to Latest Advanced Anti-Phishing Solutions, Streamlined Customer Installations
Read More
How phishing attacks spoofing Microsoft are evading security detection The phishing emails use a Microsoft logo within an HTML table, which is not analyzed by security programs, says INKY.
Read More
INKY Named to TAG Cyber’s Q2 Cyber Security Quarterly Report College Park, MD – April 21, 2021 — INKY Technology Corporation, a pioneer in next-gen email phishing protection, announced today its designation as a Distinguished Vendor in this year’s Second Quarter 2021 TAG Cyber Security Quarterly.
Read More
INKY Phish Fence is Now Available on BlackBerry Marketplace Expands Market Presence to BlackBerry Users Through a New Channel
Read More
INKY Coverage Initiated by Industry Analyst Firm 451 Research Analysts Release Research Report Initiating Coverage of Anti-Phishing Pioneer College Park, MD – March 31, 2021 –INKY Technology Corporation, a pioneer in next-gen email phishing protection, today announced 451 Research, a global research and advisory firm, has initiated its coverage of the company. INKY is presented in an analyst research report that is part of 451 Research’s ongoing series of reports on companies operating in high-growth, emerging technology market segments.
Read More
Return to offices means new opportunities for phishing   The move to home working provided new opportunities for phisherfolk, but as many people start to return to their offices the attackers are pivoting to exploit that too. A new report from email phishing protection specialist INKY shows attacks are capitalizing on vulnerability and the desire for accurate information about returning to the office in-person.
Read More