Home Search
phishing attacks - search results
If you're not happy with the results, please do another search
CyberCrimeCon 2021: Top-tier Cybersecurity Gathering to Go Live on December 2
Group-IB, one of the global cybersecurity leaders, will stream its annual signature event CyberCrimeCon on December 2, 2021. The 10th edition of CyberCrimeCon, a...
CISA, FBI Ask Critical Infrastructure Partners to be Vigilant This Festive Season
With the onset of the holiday season, employees, especially in the West, take off on the much-awaited annual leave and head home for family...
CISA, NCSA, ACSC Warn of Iranian APT Actors Exploiting Microsoft and Fortinet Flaws
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), and the United Kingdom’s National...
International Fraud Awareness Week: 3 Common Online Frauds to Watch Out in 2022
Like online shoppers prefer big sale days to grab deals, cybercriminals prey on e-commerce sites to trick unwitting shoppers. E-commerce websites are often a...
Costco Store Payment Terminal Breached by Data Skimmer
Costco Wholesale Corporation, a big-box retail store company, discovered a breach at one of its retail store terminals where a card skimming device was...
HTML Smuggling – A Novel Malware Deploying Technique
Like creating various malware variants, cybercriminals often find new techniques to deploy malware and evade security scans. As per a report from Microsoft 365...
Sideloading: A New Malware Delivery Method via Spam Email
Cybercriminals often rely on different malware campaigns to exploit new vulnerabilities and break into critical network systems. The latest security research from the Mimecast...
Robinhood Hack Exposes Shortcomings of the Human Firewall in Cybersecurity
Robinhood, a commission-free, U.S.-based trading app, joins the list of ransomware victims. On November 3, 2021, the trading platform experienced a phishing attack in...
Securing ‘Digital India’ With a Zero Trust Approach
What are some of the biggest challenges facing countries across the globe today? Technology is transforming human societies and communities across the globe, in...
How to Uproot Rootkit Threats
Threat actors leverage Trojans, malware, and ransomware to break into victims’ systems and cause maximum damage. We explain a different kind of malware threat...