Phising

Phising

image provided by pixabay

Is there honor among thieves? Don’t be so sure- cybersecurity firm HP Wolf Security has detected fake malware designed to lure wannabe digital crooks...
Password, image by pixabay

44% of users worldwide reportedly reuse their passwords on multiple accounts, putting tons of sensitive data at risk. Dashlane is a password manager, and its...
images provided by pixabay

New research from IBM proves how closely AI-enabled tools have perfected the art of writing phishing emails and fooling victims. Cybersecurity professionals and government...
image provided by pixabay

The International Criminal Court (ICC) has reportedly fallen victim to a sophisticated cyberattack suspected to be an espionage operation. The court has taken mitigating...
image provided by pixabay

The telecommunications company AT&T warns of a new cybercrime trend of embedding malicious QR codes into phishing attempts. This new type of attack was demonstrated...
image provided by pixabay

DarkBeam is a digital risk protection firm, which left its interface unprotected and so exposed records with user emails and passwords from previously reported...
images provided by pixabay

A new threat report from Europol states that malware-based ransomware cyberattacks have been a major threat, and that ransomware affiliate programs have established themselves...
images provided by pixabay

Microsoft Teams is reportedly being used by a threat actor known for working with ransomware groups to distribute phishing lures through the chats. The financially...
image provided by pixabay

Sending an email with a fake address is now easier than ever due to flaws in the process of email forwarding, according to a...
image provided by pixabay

North Korean hackers are targeting cybersecurity researchers in a revenge campaign for spying on them. Their tactic is to appear friendly and collaborative, only...
Images provided by pixabay

A fake version Signal, a private messaging app, infiltrated Google Play and Samsung’s Galaxy Store and seems to be linked to a Chinese spy...
image provided by pixabay

The FBI and its European partners seized control of a major global malware network that was used for more than 15 years to commit...
image provided by pixabay

Wannabe scammers can now perform attacks with no knowledge of IT or cyber using this new and dangerous Telegram bot, the only skill needed...
image provided by pixabay

Turns out that the old saying “if it ain’t broke- don’t fix it” does not apply to your company’s systems. It has been proven...
image provided by pixabay

"CryptoRom" scams are when a malicious element fakes a romantic interest in a victim, sometimes even cultivating long-term relationships to eventually lure the victim...
image provided by pixabay

Ransomware attacks are no new matter, but their numbers seem to be growing rapidly. The cybersecurity company Barracuda states that the number of reported...
image provided by pixabay

A threat actor has been targeting Ukraine supporters with malware ahead of the NATO summit in Vilnius on July 11-12th, this according to Blackberry’s...
image provided by pixabay

Hacking groups are constantly finding new ways to trick unsuspecting internet users, whether it’s by phishing or impersonating legitimate websites. Now they found another,...
image provided by pixabay

It is safe to assume that you’ve seen a funny deepfake video somewhere online, where the faces and sometimes voices of celebrities are put...
Image provided by pixabay

Polish media has recently reported of a major information breach. According to Polish news, attackers managed to get a hold of a three-year-old email...
Image provided by pixabay

In 2022 alone, cyber criminals managed to access over 22 million devices and exposed over 720 million credentials. The prevalence of botnets in raising these...
Image provided by pixabay

Telegram has become the working ground for the creators of phishing bots and kits looking to market their products to a larger audience or...