Home Search

phishing attacks - search results

If you're not happy with the results, please do another search
Cybersecurity Awareness Month

Cybersecurity Awareness Month 2021: Here’s What the Experts Have to Say

0
Like every year, CISA and the National Cyber Security Alliance (NCSA) are hosting the National Cybersecurity Awareness Month 2021 in the U.S. to raise...
WhisperGate malware campaign, Flagpro malware, MosaicLoader Malware, drinik

Indian Bank Users Victim of Drinik Android Malware – Use Tax Refund as Bait

0
Indian Computer Emergency Response Team (CERT-In) released an advisory related to a new malware called Drinik. The Android malware targets Indian Bank customers through a...
network security, BlackMatter ransomware, privilege

Explore 4 Key Elements of Network Security

0
Network security and threats are of primary concern during the ongoing pandemic and are increasingly becoming sophisticated and complex. No home or corporate network...
ChamelGang

Russia’s Critical Sectors Under APT Group ChamelGang’s Radar

0
The attack vector of Russian state-sponsored advanced persistent threat (APT) attackers is extended across various countries. Multiple cybercriminal groups from Russia have targeted several...
cybersecurity, password, password management,

This Device Simplifies Password Management and Protects User Credentials

0
With a mission to provide cybersecurity to individuals to safeguard themselves from threat actors, a Pune-based (Maharashtra, India) cybersecurity enthusiast came up with a...
Modern CISO

A Day in the Life of a Modern CISO

0
Over the last two decades, the role of a CISO has gained significant importance for businesses. The life of a CISO can vary quite...
Healthcare IoT, Fitness Trackers

61 Mn Fitness Tracking Records Leaked via Unsecured GetHealth Database

0
The rise of IoT devices in the health care sector led to various potential cyber risks. The usage of wearable devices like fitness bands...
Man-in-the-Middle Attack

What is Man-in-the-Middle Attack and How to Prevent them

0
Man-in-the-middle (MITM) attacks are gaining importance in the cyberattack landscape as threat actor groups are leveraging it more often to harvest users’ sensitive data...
Ransomware gangs

This is How Ransomware Gangs Select their Victims

0
Not all ransomware gangs break into targeted networks. They often purchase access to victims’ networks from other cybercriminal groups and initial access brokers (IABs)...
Network Security Threats, SSID Stripping

How Can You Identify Network Security Threats and Vulnerabilities?

0
Network security threats have become a much bigger issue today. With the expansion of Internet services and the increasing remote work culture, network vulnerabilities...