Home Search

phishing attacks - search results

If you're not happy with the results, please do another search
Phishing, phishing attacks

The Importance of Team Diversity in Detecting Phishing Scams

An email subject line catches a user’s interest. The user clicks through and gets compromised. This is a classic phishing attack; it remains one...
xss vulnerability in UPS, Phishing Attack, spear phishing

Phishing Alert! XSS Vulnerability in UPS.com Distributes Malicious Invoice

Phishing is one of the most popular social engineering techniques cybercriminals use to distribute malware and steal personal information. As per recent reports, fraudsters...
CISA, cybersecurity

CISA Release Guidelines to Prevent Ransomware Attacks

Cyber intrusions are inevitable, and evolving ransomware variants and double-extortion techniques make it even more difficult for organizations to secure their critical digital infrastructure....
BEC Attacks

These are the 3 Ps for Thwarting BEC Attacks

Business email compromise (BEC) is a prevalent email threat to organizations and a lucrative business for hackers. BEC attacks have increased and become more...
LockBit Ransomware

After Phishing and Identity Thefts, LockBit 2.0 Operations Rise in Australia

Australians have become a target for different kinds of cyberattacks lately. The Australian Competition and Consumer Commission (ACCC) reported an 84% surge in identity theft...
xss vulnerability in UPS, Phishing Attack, spear phishing

Attackers Get Cannier; Found Targeting Non-C-Suite Employees via Spear Phishing

2021 has been witnessing phishing or pretexting — types of social engineering attacks, leading all Data Breach Reports. The fraudulent practice of sending emails...
DNS attacks

These Are the Four Common DNS Attacks

From banking to e-commerce and retail to restaurant chains, it’s imperative for every business to have a digital presence on the internet today. However,...
SpoofedSccholars, second-tier targets

Iranian Hackers Impersonate U.K. Academia in “SpoofedScholars” Phishing Campaign

Cybercriminals have no boundaries. With various phishing and social engineering tactics in place, attackers target victims across the globe by operating from a single...
cryptocurrency-related cyberattacks

Bitcoin Craze Gives Rise to the Cryptocurrency-based Cyberattacks: Report

Just a couple of days back, Kevin Mandia, CEO of cybersecurity firm FireEye, told CNN that the rise in ransomware attacks is closely associated...
Compromised Email Accounts

This is How Credential Phishing is Used to Compromise Email Accounts

Despite stricter regulations over data protection globally, protecting user data has become increasingly essential. Ever wondered what happens to compromised accounts, how your leaked...

MOST POPULAR

RECENT POSTS