Home Search

phishing - search results

If you're not happy with the results, please do another search
Malware and Vulnerability Trends Report, Mobile malware threats

97% of Organizations Suffered a Mobile Malware Attack in 2020

0
The number of threats that our mobile devices encounter increases every year and the risks from mobile malware has a large share in it....
SideCopy Malware Campaign

COVID-19 and the Current Cyberthreat Landscape in India

0
It’s been over a year since the first COVID-19 death was reported in the state of Karnataka, India, in March 2020. With concerns of...
median dwell time, Supercharged AI Cyberattacks are Unavoidable

Global Median Dwell Time Drops Below One Month: FireEye Report

0
Global Median Dwell Time (defined as the duration between the start of a cyber intrusion and when it is identified) has been reducing over...

Identity Management Day: Here’s What Experts Have to Say

0
Research has pointed out that nearly 80% of organizations have faced some sort of security breach due to identity-related issues, even here nearly every...
egyption-content

Over 45 Mn Egyptians Affected in Recent Facebook Data Leak

0
A few days back, security researcher Alon Gal revealed that the personal details of nearly 533 million Facebook users from 106 countries were allegedly exposed and kept on...

Cring Ransomware Targets Unpatched Vulnerabilities in Fortinet VPNs

0
Security experts from Kaspersky identified a new strain of ransomware exploiting unpatched vulnerabilities in Fortinet VPN devices. Dubbed as Cring, the ransomware is targeting...
data breaches, Verizon Data Breach Investigation Report

4 Common Attack Vectors You Need to Know

0
Online adversaries always advance their hacking techniques to enhance their attack vectors. Cybercriminal groups focus on different kinds of cyberthreats such as data breaches,...
BigBasket Allegedly Suffers Data Breach, Customer Data on Dark Web for Sale

Scraped Data from 500 Mn LinkedIn Profiles Sold at a 4-digit Price

0
It seems like no online platform is immune to cyberattacks. Small or big, almost every internet-based enterprise has a data breach history. A few...

CISO MAG’s April 2021 Issue Highlights Attack Vectors with COVID and Vaccine Themes

0
It would not be an exaggeration to say that COVID-19 vaccines are the most sought-after commodity today. Vaccine producers are working overtime to produce...
COVID-19, Corona, Coronavirus

Cybersecurity Post-COVID: A New Era of Sophistication

0
2020 was an immensely challenging year for everyone, including the cybersecurity sector. An explosion in remote working endpoints and new technology investments brought about...