Home Search
phishing attacks - search results
If you're not happy with the results, please do another search
Episode #17: Combating Attacks in the Health Care Sector
Last year around December, there were many ransomware attacks on U.S. health care institutions. And in May this year, the Conti ransomware gang targeted...
Beyond Supply Chain Attacks and Ransomware
This past year has been one of victory - for cybercriminals. The first nine months of 2021 saw 40% more cyberattacks than the same...
Phishers Leverage Bait Attacks to Harvest Personal Data
Adversaries constantly look for new techniques to make their phishing attacks more effective; bait attacks are one of those techniques. Most phishers leverage bait attacks to...
How Cross-Site Scripting Attacks Work and How to Prevent Them
With the prevalence of hacker intrusions, the consequences of not addressing the vulnerabilities and other security loopholes in your network systems could be severe....
How U.S. Defense Contractor Electronic Warfare Associates Fell Prey to Phishing
A U.S. government defense contractor, Electronic Warfare Associates (EWA), was a victim of a data breach due to an email phishing incident. Per a...
Cyberattacks Rise in APAC Region, India Most Targeted: Acronis Cyber Readiness Report
The comprehensive overview of the present cyberthreat landscape has changed drastically, with threat actors leveraging new hacking techniques more often. Besides, the pandemic gave...
Russia-linked APT28 Phishes 14,000 Gmail Users in a State-sponsored Phishing Campaign
APT28, a threat group attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165, is targeting...
Hackers Targeted Over 75,000 Mailboxes in a Credential Phishing Campaign
Security researchers from Armorblox uncovered an ongoing credential phishing campaign exploiting the brand of email encryption provider Zix. The analysis claim that the campaign...
Conti Ransomware Attacks on Rise – CISA, FBI, NSA Issue Joint Alert
Increased use of Conti ransomware in more than 400 attacks on the U.S. and international organizations has been observed by the Cybersecurity and Infrastructure...
What are Credential Stuffing Attacks and How to Prevent Them
Thwarting cyberattacks has become highly complicated today. Unauthorized intrusions have seen a surge despite security measures implemented by internet users and corporates to safeguard...