Home Search
phishing - search results
If you're not happy with the results, please do another search
How to Stay Digitally Safe This Black Friday and Cyber Monday
The onset of the festive season drives the retail market into a frenzy. After two years of being home-ridden and extra cautious due to...
Beyond Supply Chain Attacks and Ransomware
This past year has been one of victory - for cybercriminals. The first nine months of 2021 saw 40% more cyberattacks than the same...
Researchers Uncover North Korean Threat Actor Group TA406 Targeting Diplomats
Security researchers uncovered a cyberespionage campaign linked to North Korean actors, targeting foreign policy experts, journalists, and nongovernmental organizations (NGOs). According to a cyberthreat research...
Microsoft Identifies Six Iranian State Actor Groups Deploying Ransomware
It’s not just stealing confidential data. Cybercriminal activities from state-sponsored actors have evolved, targeting critical infrastructures and demanding ransom from high-net-worth companies. Various threat...
The State of Readiness Will Always Be in Flux
Threats introduced by careless employees working from home looms large today. Studies show that 40% - 50% of employees will click on links in...
CISA, NCSA, ACSC Warn of Iranian APT Actors Exploiting Microsoft and Fortinet Flaws
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), and the United Kingdom’s National...
International Fraud Awareness Week: 3 Common Online Frauds to Watch Out in 2022
Like online shoppers prefer big sale days to grab deals, cybercriminals prey on e-commerce sites to trick unwitting shoppers. E-commerce websites are often a...
Phishers Leverage Bait Attacks to Harvest Personal Data
Adversaries constantly look for new techniques to make their phishing attacks more effective; bait attacks are one of those techniques. Most phishers leverage bait attacks to...
“AI and ML Will Be Enablers for Cybersecurity for the Foreseeable Future”
In the first half of 2021, cyber adversaries pried on opportunities to attack enterprise infrastructure and critical industries. Even the slightest security mismanagement motivated...
How Cross-Site Scripting Attacks Work and How to Prevent Them
With the prevalence of hacker intrusions, the consequences of not addressing the vulnerabilities and other security loopholes in your network systems could be severe....