Email

Threat Actors Exploiting Free Email Services to Target Government and Educational Institutions

Threat actors are increasingly leveraging free email services to infiltrate government and educational institutions, exploiting these platforms' accessibility and widespread…

2 months ago

Beware! Fake Crowdstrike Recruitment Emails Spread Cryptominer Malware

CrowdStrike, a leader in cybersecurity, uncovered a sophisticated phishing campaign that leverages its recruitment branding to propagate malware disguised as…

3 months ago

Stalwart – All-in-One Open-Source Secure Mail Server with JMAP, IMAP4, POP3, and SMTP

Stalwart is an innovative open-source mail server solution that supports JMAP, IMAP4, POP3, and SMTP, offering a comprehensive suite of…

3 months ago

Nintendo Warns of Phishing Attack Mimics Company Email Address

Nintendo has cautioned its users about a sophisticated phishing attack that involves emails mimicking official Nintendo communication. These emails, appearing…

6 months ago

Zendesk Email Spoofing Flaw Let Attackers Access Support Tickets

A security vulnerability in Zendesk, a widely used customer service tool, has been uncovered. This flaw allowed attackers to access…

6 months ago

Hackers Abusing Third-Party Email Infrastructure to Send Spam Mails

Hackers are increasingly exploiting third-party email infrastructures to send spam emails. This tactic complicates the detection and prevention of spam…

7 months ago

Trustifi’s Email Security Awareness Training – Empowering MSPs to Train & Protect Clients

In today's digital landscape, email security has become a critical concern for businesses of all sizes. As cyber threats continue…

12 months ago

Nigerian National Pleads Guilty for Hacking Business & Individual Emails

 Henry Onyedikachi Echefu, a 32-year-old Nigerian national, has admitted to his role in a sophisticated business email compromise (BEC) scheme…

1 year ago

Combat Phishing Attacks With AI-Powered Email Threat Protection: Packet Guide 2024

Cybercriminals use email phishing as one form of cybercrime to deceive victims into disclosing personal information like passwords, credit card…

1 year ago

What is Email Hijacking? – Email Account Takeover Protection Guide – 2024

Email hijacking occurs when cybercriminals gain unauthorized access to an individual's or organization's email account, it continues to pose a…

1 year ago