Home Search

phishing - search results

If you're not happy with the results, please do another search
Acronis Cyber Readiness Report, cyberattacks in India, cybercrime in India, India’s Private Sector

Hackers Target Indian banks Using Adwind Java RAT Campaign Amidst COVID-19

0
Seqrite, an enterprise arm of security firm Quick Heal Technologies, detected a new wave of Adwind Java Remote Access Trojan (RAT) campaign targeting Indian...
Financial Sector

9 In 10 Data Breaches Are Financially-Driven: Report

0
Financial gain remains the key motivator for cybercrimes with nine in 10 (86%) data breaches that were investigated and proved to be financially driven,...
Elexon Cyberattack

UK’s Electricity Body Elexon Suffers Cyberattack

0
The U.K.’s electricity middleman Elexon got a massive shock after the company suffered a cyberattack. The company’s internal systems were targeted in the attack....
Remote Work

Survey Finds 41% of Employees Use Personal Apps to Access Sensitive Company Data

0
Research by work management platform Wrike revealed that 41% of employees working remotely are accessing sensitive and confidential company information through unsecured personal applications,...
4 in 10 Organizations Struggle with SOC Staff Shortages: Report

Research Finds Changes in Adversarial Cyber Activity

0
Nuspire, a Managed Security Services Provider (MSSP), recently announced its “Quarterly Threat Landscape Report Q1 2020” that detailed the cybercriminal activities, tactics, techniques, and...
Remote work covid-19

5 Tips for Keeping Remote Workers Secure

0
With the growing proliferation of COVID-19 also comes an increasing potential for phishing campaigns as threat actors capitalize on the changing dynamics around remote...
Texas Court Systems Affected by Ransomware Attack

Texas Court Systems Affected by Ransomware Attack

0
Websites of the Texas Supreme Court and the state’s appellate courts remained shuttered after being hit by a ransomware attack. The attack affected websites...

Millions of Computers Open to Thunderbolt Port Vulnerabilities

0
A security researcher at the Eindhoven University of Technology, Bjorn Ruytenberg, have discovered that Thunderbolt-equipped computers contain vulnerabilities that could leave millions of computers...
CISA, cybersecurity, cybersecurity technologies

Don’t Abandon Security During a Crisis

0
Working within dispersed teams is often part and parcel of a CISO’s job. In fact, before COVID-19, 7% of Americans were working remotely either...
BLAZINGSUN: A New Breach on Joker’s Stash Dark Web

“Shiny Hunters” Hacker Group Keep 73 Mn User Records on Darknet

0
Members of the “Shiny Hunters” hacking group are flooding the dark web with leaked databases for sale. The hacking group is alleged of compromising...