Home Search

phishing attacks - search results

If you're not happy with the results, please do another search
Altering certified PDF Documents, FIN7 Hackers

After FIN8, Researchers Warn About FIN7 Hackers Exploiting Windows Docs

0
Attack vectors range from malicious attachments to weaponized PDFs.  These vectors have been continually evolving over the years. Recently, security experts from Anomali uncovered...
Sardonic, BitMart

FIN8 Hackers Found Using Sardonic Malware to Attack Financial Institutions

0
Information of companies and their staff published on the dark web makes financial companies and their employees a primary target of cybercriminals. Recently, cybersecurity...
CISA, cybersecurity, cybersecurity technologies

CISA Urges Organizations to Avoid Bad Security Practices

0
The cyber threat landscape is growing exponentially worldwide, with organizations suffering a series of ransomware and extortion attacks. According to an analysis from the...
Ransomware attacks, ransomware, Sinclair Broadcast group

Ransomware – What is new?

0
Executives are worried.  They see organizations crippled by ransomware, often for days or weeks, and rumors of multimillion-dollar fines being paid. By Ian Mann, CEO...
Hive Ransomware

FBI Raises Red Alert About Hive Ransomware Group

0
Authorities from the FBI are warning about a new ransomware group, tracked as Hive, which was behind the recent attacks on multiple health care...
Web Application Penetration Tester

Five Critical Skills You Need to Have as a Web Application Penetration Tester

0
Two decades back, most of the tasks related to web application security were conducted by quality assurance teams. These professionals were responsible for ensuring...
learn ethical hacking

How to Learn Ethical Hacking from Scratch and Start Your Career

0
As businesses and government organizations face increasing risks of cyber threats in the digitalization era, the interest to learn ethical hacking programs has increased. The demand for these...
IoT Hacking Tools

Top 5 Internet of Things (IoT) Hacking Tools Explained

0
Internet of Things (IoT) devices raise critical security concerns for ethical hackers as these devices are easy to hack with IoT hacking tools. More than...
Network Security

Network Security for Legal Eagles

0
Today, no industry sector is safe from cyberattacks, as threat actors target businesses with a malicious aim of gaining information or monetary benefits. The...
Siamesekitten threat group

Iranian APT Group “Siamesekitten” Targets Israeli Firms in a Cyberespionage Campaign

0
Security researchers uncovered a new cyberespionage campaign by Iranian hackers targeting IT and telecom companies in Israel with supply-chain attacks. Tracked as Siamesekitten (also...