phishing
-
Read moreA new malware campaign disguised as an Instagram growth tool is stealing login credentials. Learn how "imad213" works and how to protect your account.
-
Read moreCybercriminals have devised an alarming new tactic by hiding malware in Google Calendar invites using invisible Unicode characters. This stealthy technique enables the delivery of malicious payloads through trusted platforms—bypassing traditional security mechanisms with a single deceptive character.
-
Read moreA dangerous new malware named GIFTEDCROOK is targeting Ukrainian government systems. Disguised in phishing emails, this malware is designed to steal sensitive browser data and exfiltrate it through Telegram, making it hard to detect. Cybersecurity experts are warning that this attack is part of a growing trend in cyber-espionage by threat actors.
-
Posted: June 16, 2023Categories: Events and News, Cyber Attack, Data Breach, Phishing, Browser Hijack, Hacker, Cloud SecurityViews: 48Read moreThe MOVEit data theft attacks have caused the Clop ransomware gang to start extorting businesses, first posting the names of
-
Posted: May 17, 2023Views: 26Read moreEmail phishing continues to evolve as cybercriminals become more sophisticated in their tactics. One prevalent form of email phishing involves
-
Read moreIn mail phishing, attackers send emails that appear to be from a reputable source such as a bank, social media
-
Read moreIn today’s digital age, phishing attacks have become increasingly sophisticated, and one of the latest forms of phishing is webmail
-
Read moreThe threat of Iranian hackers targeting Israeli infrastructure and networks is a growing concern for the country’s cybersecurity. Iran is
-
Read moreExploiting a zero-day vulnerability (CVE-2023-28252) in the Windows Common Log File System, threat actors have launched new attacks to distribute
-
Read moreHackers use the email that contains unsolicited messages or instructions that imitate actual email from legitimate sources such as DHL