Home Search
phishing attacks - search results
If you're not happy with the results, please do another search
Different Types of Ethical Hackers: White, Black, and Grey Hats Explained
There are several types of ethical hackers depending on the hacker’s intent and goal. This article highlights the concepts of hacking and the different types of...
Everything You Need to Know About the Evolution of Cyberthreats
The theory of evolution proposed by Charles Darwin is based on the concept of change in characteristics of a population over successive generations. An...
Risk-based Vulnerability Management – Overdue for Automation
The digital world is a blink-and-you’ll-miss-it environment, and organizations need to move aggressively to shrink the exploitable vulnerability window. Adversaries are breaching the security...
Ransomware Continues its Marathon to New Records: Report
Cybercriminals always aim high when targeting organizations and demanding ransom. The pandemic has given opportunistic hackers time to come up with innovative phishing attacks...
Data Breach Affects 300,000 Reindeer Customers Data
While cloud computing is helping organizations in advancing their operations, data leaks due to cloud misconfigurations are giving nightmares to businesses. A threat analysis...
Florida DEO Suffers Data Breach, Over 57K Accounts Affected
Whether it’s to gain fame or obtain a large amount of private data, threat actors often target government agencies. Recently, Florida's Department of Economic...
ACCC Warns About Rising Remote Access Scams in Australia
While the government of Australia is constantly trying to boost cybersecurity, a recent analysis divulged the rising threat of remote access scams in the...
How Cryptojacking and Cryptomining Assaults Work
When reporters asked the infamous bank robber Willie Sutton why he robbed banks he allegedly replied, “because that’s where the money is”. It was...
How Video Streaming Services Can Stay One Step Ahead of Cybercriminals
The global video streaming industry is a multi-billion-dollar market that includes renowned brands such as Disney and Netflix alongside smaller, more niche players. Many...
Business Email Compromise: The Most Common Threat Vector Across Sectors
Business Email Compromise (BEC) attacks have become the most common email threats across various sectors, giving rise to many social engineering and financial frauds....