Home Search

phishing - search results

If you're not happy with the results, please do another search
Ransomware Attacks, Graff ransomware attack

Ransomware: A Lucrative Business Model for Hackers, says FS-ISAC

0
A recent survey from the Financial Services Information Sharing and Analysis Center (FS-ISAC), highlighted that rapidly evolving ransomware attacks have become a primary security...
Endpoint Security Interview with Karmesh Gupta

“Unified solutions could hold the key in enforcing endpoint security policies”

0
The exponential increase in endpoints in the last nine months has hugely contributed to a dramatic rise in network and endpoint perimeter breaches. However,...
Gaming

Japanese Gaming Giant Capcom Hit by a Cyberattack

0
Japanese game developer and publisher Capcom suffered a security incident on November 2, 2020, which impacted its operations, including email and file servers. The...
SideCopy Malware Campaign

CYFIRMA’s Threat Landscape Report Reveals Interesting Trends and Threat Actors Targeting India

0
CYFIRMA, a Singapore-based cybersecurity firm, has released the India Threat Landscape Report 2020. The researchers at CYFIRMA have been actively observing global cyberattack trends...
covid-19 vaccine, vaccine

1 in 4 Cyberattacks Handled by U.K.’s NCSC Were Related to COVID-19

0
Over one in four security incidents handled by the U.K.’s National Cyber Security Centre (NCSC) last year were COVID-19 related cyberthreats. In its annual...

5G Security: Possible Risks and Challenges

0
5G is taking the world by storm. This game-changing technology takes mobile connectivity to a whole new level by introducing jaw-dropping speeds and low...
actively exploited vulnerabilities, Vulnerabilities, risk-based vulnerability management

Old Unpatched Vulnerabilities Could Invoke Cyberattacks and Malware

0
The “new normal” business operations left most organizations vulnerable to new attack vectors. From database misconfigurations to unpatched vulnerabilities, organizations suffered several challenges in...
1 in 3 CISOs feel biggest challenge of endpoint solution is its complexity

Insights for CISOs to Secure Telework for the Long-term

0
The COVID-19 pandemic drove the formation of a “new normal” that saw organizations shift the majority of, if not their entire, workforce to a...
BEC Scammers Exploit Email Auto-Forwarding Rules, FBI warns

Business Email Compromise Attacks Surge in Q3 2020

0
A research from email security solutions provider Abnormal Security revealed that Business Email Compromise (BEC) attacks have surged across most industries, with a drastic...
Android Trojan, Trojan, ReverseRat, Numando Banking Trojan

Wroba Trojan Resurfaces, Targets U.S. Users

0
For the most part, Wroba Trojan activities were limited to the Asian countries. But very recently, researchers at Kaspersky Labs are seeing the mobile...