Home Search

phishing - search results

If you're not happy with the results, please do another search
Facebook copyright complaint

Alert, Facebook Users! That Copyright Complaint Could be Malicious

0
It’s a common practice for threat actors to exploit users’ social media handles for their illicit activities. From malware payloads to hacking tools, attackers...
Sardonic, BitMart

Illicit Cryptomining Surges Amid Soaring Crypto Value

0
Most cybercriminals are financially motivated, performing various malicious cyber activities to generate revenue. Several threat actor groups leverage cryptocurrencies, demanding ransom payments in Bitcoin...
SolarWinds Microsoft

Chinese Hacking Group ‘DEV 0322’ Exploits SolarWinds Serv-U Software: Microsoft

0
The infamous SolarWinds attacks have left a severe impact on the cybersecurity landscape. While organizations are still recovering from its consequences, Microsoft recently warned...
Insider attacker leak data

Insider Threats: The Primary Security Challenge for 94% of Organizations

0
Cyberattacks can happen for multiple reasons; however, one primary reason for rising data breaches is inadvertent employee errors or insider threats. Insider threats are...
Financial Sector

National Cyber Security Coordinator of India to Speak at Pursuit 2021

0
The COVID-19 pandemic has brought new challenges to our doorstep. Cybercrimes have seen a startling surge, affecting both SMBs and critical infrastructure. Consequently, the...
Remote Access Scams

ACCC Warns About Rising Remote Access Scams in Australia

0
While the government of Australia is constantly trying to boost cybersecurity, a recent analysis divulged the rising threat of remote access scams in the...
Sardonic, BitMart

How Cryptojacking and Cryptomining Assaults Work

0
When reporters asked the infamous bank robber Willie Sutton why he robbed banks he allegedly replied, “because that’s where the money is”. It was...
WhisperGate malware campaign, Flagpro malware, MosaicLoader Malware, drinik

Caution! Attackers Found Distributing Malicious Privacy Tool to Steal Sensitive Data

0
Cybercriminals often enhance their phishing tactics to lure unwitting users into downloading malware. In one such new phishing threat uncovered by security researchers from...
Quantum encryption

Quantum Encryption and the One-time Keypad

0
Secrecy is important for sending encrypted messages over the internet. Sensitive personal information is often exchanged while remaining vulnerable to hacks, leaks, etc. To...
streaming services

How Video Streaming Services Can Stay One Step Ahead of Cybercriminals

0
The global video streaming industry is a multi-billion-dollar market that includes renowned brands such as Disney and Netflix alongside smaller, more niche players. Many...