Phising

Phising

images provided by pixabay

Microsoft claims US adversaries like Iran, North Korea, Russia, and China are beginning to use generative AI to organize offensive cyber operations. The tech giant...
image provided by pixabay

Artificial intelligence tools for the general public (ChatGPT, Bard, Dall-E) are being widely used for many everyday tasks, but users with malicious intentions can...
image provided by pixabay

The growing trend of AI-generated content and deep fakes is making us lose our trust in the internet. Can identity decentralization be the solution?...
image provided by pixabay

Project Mockingbird is computer security company McAfee's latest breakthrough designed to arm consumers against the growing threat of online deepfake scams and was revealed...
Cyber intelligence. image by pixabay

As threat actors use artificial intelligence to their advantage, it’s essential that organizations evolve along with them to respond to and prevent these threats. One...
image provided by pixabay

The operator of Europe's largest parking app EasyPark Group was recently a victim of a major data breach that compromised the personal information of...
image provided by pixabay

The ever-evolving cybersecurity landscape promises to bring new cyber threat actors, vulnerabilities, and weaknesses to counter, and as technology evolves, so do cyber threat...
image provided by pixabay

Fraud is one of the most common crimes in the world nowadays, and AI is making it much more widespread and harder to detect....
image provided by pixabay

The six-month-long Operation HAECHI IV was an international law enforcement effort targeting online financial crime, and it has resulted in nearly 3,500 arrests and...
image provided by pixabay

Nowadays, many malicious elements online use AI to digitally expand their operations, and experts claim that such AI-generated fraud is only expected to worsen. This...
image provided by pixabay

Cybersecurity researchers investigated conversations between hackers and analyzed trending topics on one of the dark web’s largest hacker forums and compiled a list of...
images provided by pixabay

Various US authorities are alerting the public to common online fraud schemes as part of the “Don’t Click December” campaign. According to Cybernews, the following...
Image provided by pixabay

Close to a million files containing sensitive private information of minors were left completely exposed to anyone on the internet, thus posing a threat...
image provided by pixabay

The FBI is warning organizations of the ransomware group “Scattered Spider” that has for the past year breached dozens of American firms and stolen...
image provided by pixabay

This threat actor is now using an infection chain based on delivering a new initial access downloader dubbed IronWind, as was observed by cybersecurity...
images provided by pixabay

A new malware campaign targeting visitors of the “Windows Report” portal was uncovered by security experts at the cyber firm Malwarebytes. In this campaign,...
image provided by pixabay

QR code-based phishing attacks (also called “quishing”) are rising, with threat actors using malicious QR codes to steal valuable data and money. Furthermore, experts...
image provided by pixabay

Is there honor among thieves? Don’t be so sure- cybersecurity firm HP Wolf Security has detected fake malware designed to lure wannabe digital crooks...
Password, image by pixabay

44% of users worldwide reportedly reuse their passwords on multiple accounts, putting tons of sensitive data at risk. Dashlane is a password manager, and its...
images provided by pixabay

New research from IBM proves how closely AI-enabled tools have perfected the art of writing phishing emails and fooling victims. Cybersecurity professionals and government...
image provided by pixabay

The International Criminal Court (ICC) has reportedly fallen victim to a sophisticated cyberattack suspected to be an espionage operation. The court has taken mitigating...
image provided by pixabay

The telecommunications company AT&T warns of a new cybercrime trend of embedding malicious QR codes into phishing attempts. This new type of attack was demonstrated...