Home Search
phishing attacks - search results
If you're not happy with the results, please do another search
Top 10 Common Types of Network Security Attacks Explained
The risk of network security attacks is mounting as businesses transition to a remote work environment and embrace sophisticated technology.
The IT (Information Technology) and...
Email Threats Continue to be Gateway of Major Cyberattacks
Cyberattacks via unsolicited emails remain an effective attack vector as threat actors continue to evolve their phishing techniques. Adversaries are quick to adopt new...
The Importance of Team Diversity in Detecting Phishing Scams
An email subject line catches a user’s interest. The user clicks through and gets compromised. This is a classic phishing attack; it remains one...
Phishing Alert! XSS Vulnerability in UPS.com Distributes Malicious Invoice
Phishing is one of the most popular social engineering techniques cybercriminals use to distribute malware and steal personal information. As per recent reports, fraudsters...
CISA Release Guidelines to Prevent Ransomware Attacks
Cyber intrusions are inevitable, and evolving ransomware variants and double-extortion techniques make it even more difficult for organizations to secure their critical digital infrastructure....
These are the 3 Ps for Thwarting BEC Attacks
Business email compromise (BEC) is a prevalent email threat to organizations and a lucrative business for hackers. BEC attacks have increased and become more...
After Phishing and Identity Thefts, LockBit 2.0 Operations Rise in Australia
Australians have become a target for different kinds of cyberattacks lately. The Australian Competition and Consumer Commission (ACCC) reported an 84% surge in identity theft...
Attackers Get Cannier; Found Targeting Non-C-Suite Employees via Spear Phishing
2021 has been witnessing phishing or pretexting — types of social engineering attacks, leading all Data Breach Reports. The fraudulent practice of sending emails...
These Are the Four Common DNS Attacks
From banking to e-commerce and retail to restaurant chains, it’s imperative for every business to have a digital presence on the internet today. However,...
Iranian Hackers Impersonate U.K. Academia in “SpoofedScholars” Phishing Campaign
Cybercriminals have no boundaries. With various phishing and social engineering tactics in place, attackers target victims across the globe by operating from a single...