Home Search
phishing attacks - search results
If you're not happy with the results, please do another search
After FIN8, Researchers Warn About FIN7 Hackers Exploiting Windows Docs
Attack vectors range from malicious attachments to weaponized PDFs. These vectors have been continually evolving over the years. Recently, security experts from Anomali uncovered...
FIN8 Hackers Found Using Sardonic Malware to Attack Financial Institutions
Information of companies and their staff published on the dark web makes financial companies and their employees a primary target of cybercriminals. Recently, cybersecurity...
CISA Urges Organizations to Avoid Bad Security Practices
The cyber threat landscape is growing exponentially worldwide, with organizations suffering a series of ransomware and extortion attacks. According to an analysis from the...
Ransomware – What is new?
Executives are worried. They see organizations crippled by ransomware, often for days or weeks, and rumors of multimillion-dollar fines being paid.
By Ian Mann, CEO...
FBI Raises Red Alert About Hive Ransomware Group
Authorities from the FBI are warning about a new ransomware group, tracked as Hive, which was behind the recent attacks on multiple health care...
Five Critical Skills You Need to Have as a Web Application Penetration Tester
Two decades back, most of the tasks related to web application security were conducted by quality assurance teams. These professionals were responsible for ensuring...
How to Learn Ethical Hacking from Scratch and Start Your Career
As businesses and government organizations face increasing risks of cyber threats in the digitalization era, the interest to learn ethical hacking programs has increased. The demand for these...
Top 5 Internet of Things (IoT) Hacking Tools Explained
Internet of Things (IoT) devices raise critical security concerns for ethical hackers as these devices are easy to hack with IoT hacking tools.
More than...
Network Security for Legal Eagles
Today, no industry sector is safe from cyberattacks, as threat actors target businesses with a malicious aim of gaining information or monetary benefits. The...
Iranian APT Group “Siamesekitten” Targets Israeli Firms in a Cyberespionage Campaign
Security researchers uncovered a new cyberespionage campaign by Iranian hackers targeting IT and telecom companies in Israel with supply-chain attacks. Tracked as Siamesekitten (also...