Home Search
phishing - search results
If you're not happy with the results, please do another search
CISA Urges Organizations to Avoid Bad Security Practices
The cyber threat landscape is growing exponentially worldwide, with organizations suffering a series of ransomware and extortion attacks. According to an analysis from the...
Ransomware – What is new?
Executives are worried. They see organizations crippled by ransomware, often for days or weeks, and rumors of multimillion-dollar fines being paid.
By Ian Mann, CEO...
FBI Raises Red Alert About Hive Ransomware Group
Authorities from the FBI are warning about a new ransomware group, tracked as Hive, which was behind the recent attacks on multiple health care...
Five Critical Skills You Need to Have as a Web Application Penetration Tester
Two decades back, most of the tasks related to web application security were conducted by quality assurance teams. These professionals were responsible for ensuring...
Email Threats Continue to be Gateway of Major Cyberattacks
Cyberattacks via unsolicited emails remain an effective attack vector as threat actors continue to evolve their phishing techniques. Adversaries are quick to adopt new...
How to Learn Ethical Hacking from Scratch and Start Your Career
As businesses and government organizations face increasing risks of cyber threats in the digitalization era, the interest to learn ethical hacking programs has increased. The demand for these...
Top 5 Internet of Things (IoT) Hacking Tools Explained
Internet of Things (IoT) devices raise critical security concerns for ethical hackers as these devices are easy to hack with IoT hacking tools.
More than...
Network Security for Legal Eagles
Today, no industry sector is safe from cyberattacks, as threat actors target businesses with a malicious aim of gaining information or monetary benefits. The...
CISA Release Guidelines to Prevent Ransomware Attacks
Cyber intrusions are inevitable, and evolving ransomware variants and double-extortion techniques make it even more difficult for organizations to secure their critical digital infrastructure....
Iranian APT Group “Siamesekitten” Targets Israeli Firms in a Cyberespionage Campaign
Security researchers uncovered a new cyberespionage campaign by Iranian hackers targeting IT and telecom companies in Israel with supply-chain attacks. Tracked as Siamesekitten (also...