Home Search

phishing attacks - search results

If you're not happy with the results, please do another search
Apple Is Hackers’ Favorite for Brand Phishing Attacks, REvil gang threatens Apple blueprint leak

Apple Is Hackers’ Favorite for Brand Phishing Attacks

0
Apple was the most frequently used brand in phishing attacks during the first quarter of 2020, according to Check Point’s research. The research report...
Cryptocurrency scams in Australia

Hackers Target Australians with Phishing Attacks Amid COVID-19 Crisis

0
With majority of the employees working remotely, cybercriminals are taking advantage of the ongoing COVID-19 crisis across the globe. Several industry experts stated that...
Phishing Campaign on FINRA

US Healthcare institutions are vulnerable to phishing attacks: Survey

0
A recent survey revealed that employees at U.S. health care institutions may be susceptible to phishing emails. The report, Assessment of Employee Susceptibility to...
xss vulnerability in UPS, Phishing Attack, spear phishing, phishing mails

Spam Attacks: How Not to Get Hooked On Phishing Mails

0
As more criminals turn to online scams to steal your confidential data, phishing prevention has become critical. We now know what spam emails are...
phishing campaign, Smishing attacks

Phishing and Ransomware are the top attacks on Financial Firms: Survey

0
Security researchers stated that Phishing and Ransomware attacks are the most reported types of cyber-attacks on financial services firms. According to the Audit and...
Steganography attack

How to Prevent Steganography Attacks

0
Cybercriminals are well-versed in shifting their hacking techniques and adapting new threat strategies to specific situations and opportunities. Threat actors often leverage various tactics...
Cryptojacking

Cryptojacking Attacks Rise As Hackers Try to Exploit Linux-based Machines

0
Researchers at Bitdefender Security recently discovered a Romanian-based threat intelligence group hacking Linux machines and targeting systems with weak Secure Shell Protocol (SSH) credentials. The...
Nobelium

Nobelium’s Phishing Campaign Targets French Entities

0
In a report, the ANSSI (French National Cybersecurity Agency) revealed that it has observed several phishing campaigns directed against French entities since February 2021....
Phishing Kits, Cost of Phishing Attacks

How Cybercriminals Use Phishing Kits

0
Cybercriminals are creating new phishing strategies and malware variants to make their attacks more intense and successful. They even rely on phishing kits, which...
Credential Abuse Attack, credential harvesting campaign

How to Prevent Credential Abuse Attacks?

0
Strong login credentials are treated as the first defense against unauthorized intrusions. However, they also become a gateway for cybercriminals to penetrate critical network...

MOST POPULAR

RECENT POSTS