Phishing

  1. Hackers Use Images to Hide Malware and Steal Sensitive Data
  2. Cybercriminals Exploit Google Search Ads to Hijack Google Ads Accounts
  3. FireScam Malware Poses as Telegram Premium to Steal Data and Control Devices
  4. Horns and Hooves Campaign Targets Businesses with Advanced RAT Malware
  5. Thousands of Fake Shopping Sites Launched to Steal Credit Card Data During Black Friday
  6. Cybercriminals Exploit Webflow to Launch Phishing Campaigns Targeting Sensitive Credentials
  7. Gophish Framework Exploited in Phishing Campaigns to Deploy DCRat and PowerRAT
  8. Bumblebee Malware Returns After Law Enforcement Crackdown, Signaling Potential New Threat Wave
  9. Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Government Login Credentials
  10. Fake Google Meet Errors Used in ClickFix Campaigns to Spread Infostealing Malware
Back to Top