Home Search
phishing - search results
If you're not happy with the results, please do another search
New Cyber Campaign “Armor Piercer” Targets Indian Government Officials
Cyberattacks and malicious campaigns are becoming rampant, with new cybercriminal operations being reported more often in the security landscape. Recently, security experts from Cisco...
Conti Ransomware Attacks on Rise – CISA, FBI, NSA Issue Joint Alert
Increased use of Conti ransomware in more than 400 attacks on the U.S. and international organizations has been observed by the Cybersecurity and Infrastructure...
A Day in the Life of a Modern CISO
Over the last two decades, the role of a CISO has gained significant importance for businesses. The life of a CISO can vary quite...
Numando Banking Trojan Abuses YouTube, Pastebin and other Public Platforms
ESET Research spotted a banking Trojan Numando, as part of a series on Malware in Latin America. Numando, like its other malware families, uses...
Ongoing Credential Harvesting Campaign Targets Government Agencies in APAC, EMEA
Security researchers uncovered a widespread credential harvesting campaign targeting government agencies across seven countries in the Asia-Pacific (APAC), Europe, and the Middle East and...
What are Credential Stuffing Attacks and How to Prevent Them
Thwarting cyberattacks has become highly complicated today. Unauthorized intrusions have seen a surge despite security measures implemented by internet users and corporates to safeguard...
Cybercrime in India Surges by 11.8% in 2020: NCRB
It’s not only about the new normal, but the pandemic is also the beginning of a new era in the cyberthreat landscape. The year...
Microsoft Account Passwords Might Soon Be a Thing of the Past
Almost every cyberattack report mentions user credentials and passwords being stolen and sold on dark web forums. Be it ransomware, malware or any phishing...
South Africa’s Department of Justice Network Under Ransomware Attack
The Department of Justice and Constitutional Development of South Africa admitted that its IT systems and operations were disrupted in a ransomware attack. The...
61 Mn Fitness Tracking Records Leaked via Unsecured GetHealth Database
The rise of IoT devices in the health care sector led to various potential cyber risks. The usage of wearable devices like fitness bands...