Home Search
phishing attacks - search results
If you're not happy with the results, please do another search
Apple Is Hackers’ Favorite for Brand Phishing Attacks
Apple was the most frequently used brand in phishing attacks during the first quarter of 2020, according to Check Point’s research. The research report...
Hackers Target Australians with Phishing Attacks Amid COVID-19 Crisis
With majority of the employees working remotely, cybercriminals are taking advantage of the ongoing COVID-19 crisis across the globe. Several industry experts stated that...
US Healthcare institutions are vulnerable to phishing attacks: Survey
A recent survey revealed that employees at U.S. health care institutions may be susceptible to phishing emails. The report, Assessment of Employee Susceptibility to...
Spam Attacks: How Not to Get Hooked On Phishing Mails
As more criminals turn to online scams to steal your confidential data, phishing prevention has become critical. We now know what spam emails are...
Phishing and Ransomware are the top attacks on Financial Firms: Survey
Security researchers stated that Phishing and Ransomware attacks are the most reported types of cyber-attacks on financial services firms. According to the Audit and...
How to Prevent Steganography Attacks
Cybercriminals are well-versed in shifting their hacking techniques and adapting new threat strategies to specific situations and opportunities. Threat actors often leverage various tactics...
Cryptojacking Attacks Rise As Hackers Try to Exploit Linux-based Machines
Researchers at Bitdefender Security recently discovered a Romanian-based threat intelligence group hacking Linux machines and targeting systems with weak Secure Shell Protocol (SSH) credentials. The...
Nobelium’s Phishing Campaign Targets French Entities
In a report, the ANSSI (French National Cybersecurity Agency) revealed that it has observed several phishing campaigns directed against French entities since February 2021....
How Cybercriminals Use Phishing Kits
Cybercriminals are creating new phishing strategies and malware variants to make their attacks more intense and successful. They even rely on phishing kits, which...
How to Prevent Credential Abuse Attacks?
Strong login credentials are treated as the first defense against unauthorized intrusions. However, they also become a gateway for cybercriminals to penetrate critical network...