Home Search

phishing - search results

If you're not happy with the results, please do another search
Panasonic network breach

Unprotected Database Exposed Personal Data of 267M Facebook Users

0
Another one on Facebook’s cap. An unprotected public database containing over 267 million Facebook user IDs, names, and contact details were left online without...

6 Simple Moves to Respond to a Ransomware Attack

0
Numerous companies and state governments have been plagued by ransomware attacks, which are now more common than ever. Unlike other cyber threats that usually...
Ransomware attacks, ransomware, Sinclair Broadcast group

New Orleans Declares State of Emergency After Ransomware Attack

0
New Orleans, a city in Louisiana, is the latest victim of a cyber-attack. The city declared a state of emergency and shut down its...

Rewind: Biggest Cyber Incidents We Saw in 2019

0
By Rudra Srinivas  If there is a thing or two that we can learn from the year that went by, it is the fact that...
Data breach in 100 U.S. cities

2.7 Billion Email Addresses Exposed Online

0
Researchers noticed a huge database containing email addresses and passwords left online without password protection. A joint investigation by cybersecurity firm Comparitech and security researcher...
PhantomLance Targets Android App Store to Spread Malware and Spyware, message encryption for Android

Previous Security Vulnerabilities Still Exist in New Android Applications

0
Security experts have observed that Android app makers have not patched the old security flaws, many of which even dates back to 2014. According to Check...
Android Trojan, Trojan, ReverseRat, Numando Banking Trojan

What You Need to Know Now About Banking Trojans

0
By Derek Manky, Chief of Security Insights and Global Threat Alliances, Fortinet Cybercriminals continue to refine existing malware to evade detection and deliver increasingly sophisticated...

StrandHogg Vulnerability Hunting All Android Versions

0
Researchers at Promon, a cybersecurity firm better known for its in-app security protection, have found a vulnerability in the Android operating system named “StrandHogg.”...
Liquid Exchange Hack

6 Times Digital Currency Made Headlines in 2019

0
By Rudra Srinivas Since the inception of cryptocurrency (Bitcoin) in 2009, there is a significant evolution of blockchain technology and a variety of challenges as...
Group-IB’s Graph Network Analysis tool

This Tool Predicts Cybercriminal Activity Even Before It Happens

0
Group-IB, an international cybersecurity company that specializes in preventing cyberattacks, has launched a new tool for clients, which helps to predict and attribute attacks,...