Home Search
phishing attacks - search results
If you're not happy with the results, please do another search
Password Day 2021: Tips for Your First Line of Defense
The last year has seen most of us adopt new ways of working, collaborating, communicating, and shopping, as well as changing our entertainment habits.
By...
Cybersecurity After COVID-19
In addition to the health and economic impacts of COVID-19, society had to grapple with a plethora of new and persistent cybersecurity threats. As...
CISOs are Struggling with Continuous Security Debts: Surveys
With the increase in the volume of cyberattacks, security leaders are changing their cybersecurity measures accordingly. However, cybercriminals too become consistent in advancing their...
Malvertising Mayhem: Here’s Everything You Need to Know
Cybercriminals often create innovative malware variants and malicious campaigns to steal users’ identities or private information. In most malware-related attacks, threat actors deploy malware...
COVID-19 and the Current Cyberthreat Landscape in India
It’s been over a year since the first COVID-19 death was reported in the state of Karnataka, India, in March 2020. With concerns of...
Identity Management Day: Here’s What Experts Have to Say
Research has pointed out that nearly 80% of organizations have faced some sort of security breach due to identity-related issues, even here nearly every...
Over 45 Mn Egyptians Affected in Recent Facebook Data Leak
A few days back, security researcher Alon Gal revealed that the personal details of nearly 533 million Facebook users from 106 countries were allegedly exposed and kept on...
Cring Ransomware Targets Unpatched Vulnerabilities in Fortinet VPNs
Security experts from Kaspersky identified a new strain of ransomware exploiting unpatched vulnerabilities in Fortinet VPN devices. Dubbed as Cring, the ransomware is targeting...
Cybersecurity Post-COVID: A New Era of Sophistication
2020 was an immensely challenging year for everyone, including the cybersecurity sector. An explosion in remote working endpoints and new technology investments brought about...
Double Whammy: Meet Ransomware 2.0
Ransomware operators and their ransomware attacks are becoming more rampant and successful than ever. Ransomware groups are always leveraging a combination of factors to...