GBH
GBH
Open Redirect Vulnerabilities

Hackers Use Open Redirect Vulnerabilities in Online Services to Deliver Phishing Content

0
Researchers at Resecurity noticed threat actors leveraging Open Redirect Vulnerabilities which is popular in online services and apps to evade spam filters to deliver...
Hackers Delivered a Lockbit Ransomware Through Fake Copyright Claim E-mail

Hackers Delivered a Lockbit Ransomware Through Fake Copyright Claim E-mail

0
One of the interesting tricks used by LockBit affiliates is disguising their malware as copyright claims in order to trick users into infecting their...
Modern Phishing Attacks; Fingerprints of Social Engineering

Modern Phishing Attacks; Fingerprints of Social Engineering

0
People are increasingly sharing their personal information online, thanks to the rapid expansion of internet usage. As a result, malicious actors have access to...
Phishing Group Busted

Law enforcement Officers Busted Phishing Group That Uses 40 Websites to Steal Credit Card...

0
On 22nd February 2022, Ukrainian Police officials arrested a group of threat actors that were involved in a phishing campaign. They used a mobile...
The Biggest Phishing Scams of All Time

The Biggest Phishing Scams of All Time

0
Nobody enjoys falling victim to one of the many online scams which occur in the modern day. Phishing is arguably one of the worst...
Phishing Attack Prevention: Best 10 Ways To Prevent Email Phishing Attacks

Phishing Attack Prevention: Best 10 Ways To Prevent Email Phishing Attacks

0
No one wants to believe they’d fall victim to phishing attacks. However, phishing attacks are on the rise and are more sophisticated than ever....
Spear Phishing Attack

Spear Phishing is the Next Big Challenge for CISOs

0
Phishing, which started off as Nigerian Prince scams in the 1990s, has become a common attack vector ever since. As though phishing wasn’t enough...
A New Sophisticated Office 365 Phishing Scam Targets Employees of Insurance & Financial Departments

A New Sophisticated Office 365 Phishing Scam Targets Employees of Insurance & Financial Departments

0
Security analysts at Area 1 Security have recently discovered a new sophisticated Office 365 phishing scam that is targeting the execs of the insurance...
Image Inversion Technique

Attackers Using Image Inversion Technique to Bypass Office 365 Filtering Mechanism

0
A creative Office 365 phishing campaign was discovered by WMC Global Analysis researchers that a legitimate login page of a Microsoft Account, but uses...
Zoom Phishing

Beware of Zoom Phishing Campaign that Threatens Employees Contracts will be Suspended or Terminated

0
A new zoom phishing campaign observed asking recipients to join a zoom meeting that threatens employees that their contracts will be either suspended or...

Complete Free Website Security Check

Website

Recent Posts