Home Search
phishing - search results
If you're not happy with the results, please do another search
Mobile Malware – A Persistent Threat Targeting COVID Vaccines and Banking Activities
In addition to high-profile ransomware attacks on various industry vectors, cyberattacks on mobile devices surged during the pandemic. When employees across the globe were...
Bitcoin Craze Gives Rise to the Cryptocurrency-based Cyberattacks: Report
Just a couple of days back, Kevin Mandia, CEO of cybersecurity firm FireEye, told CNN that the rise in ransomware attacks is closely associated...
Rep. Veasey and Others Introduce American Cybersecurity Literacy Act to Mitigate Cyber Risks
Improving cybersecurity awareness among individuals could eventually help mitigate cyber risks. And educating users on different kinds of cyberattacks will make them act accordingly...
NOBELIUM Group Targeted a Customer Care Agent at Microsoft
It’s a daily routine for the cybersecurity community to encounter new kinds of cyberthreats from old perpetrators. Recently, the Microsoft Threat Intelligence Center (MSTIC)...
Adversaries on a Vaccine Trail
To most of the world’s population, COVID-19 vaccines may be the most highly valued commodity today. That is not an exaggeration. While governments around...
Attention Gamers! Your Cybersecurity Score Matters
Cybercriminals and ransomware operators often play with their hacking skills, targeting victims for sensitive information. Despite enhanced security measures, threat actors targeted all sectors...
Business Email Compromise: The Most Common Threat Vector Across Sectors
Business Email Compromise (BEC) attacks have become the most common email threats across various sectors, giving rise to many social engineering and financial frauds....
New Bill Mandates Australian Organizations to Notify Before Paying Ransom
Ransomware attacks are not a common security incident anymore. Several countries are severely concerned about the rising sophistication of ransomware attacks. Some governments even...
Another Case of Unprotected Database: 5 Bn Records from Previous Data Breaches Leaked
Unsecured databases are potential cyberthreats for organizations. Perpetrators often look for unprotected/misconfigured servers to infiltrate and compromise sensitive corporate data. A recent security research...
“IoT technology will always improve but it will never be 100% secure”
The proliferation of the Internet of Things (IoT) in consumer, enterprise, and health care sectors, and their internal vulnerabilities, have created a security blind...