Cyber Attack
APT-C-60 Attacking HR Department With Weaponized Resumes
APT-C-60 launched a phishing attack in August 2024, targeting domestic organizations with malicious emails disguised as job applications.These emails, sent to recruitment departments,...
cyber security
Shut Down Phishing Attacks -Detection & Prevention Checklist
In today's interconnected world, where digital communication and transactions dominate, phishing attacks have become an ever-present threat.By masquerading as trustworthy entities, phishing attacks deceive...
Cyber Security News
Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims to fake login pages hosted on Weebly, targeting telecommunications...
Cyber Crime
240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft
Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based cybercriminal Abanoub Nady, known online as "MRxC0DER." Nady developed and...
Cyber Security News
5 Hackers Charged for Attacking Companies via Phishing Text Messages
Federal authorities have unsealed charges against five individuals accused of orchestrating sophisticated phishing schemes that targeted employees of companies across the United States.The...
cyber security
North Korean IT Worker Using Weaponized Video Conference Apps To Attack Job Seakers
North Korean IT workers, operating under the cluster CL-STA-0237, have been implicated in recent phishing attacks leveraging malware-infected video conference apps. The group, likely based...
Cyber Security News
Chinese SilkSpecter Hackers Attacking Black Friday Shoppers
SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce shoppers in Europe and the USA during the Black Friday...
Cyber Crime
Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars From Customers
The Phish, 'n' Ships fraud operation leverages, compromised websites to redirect users to fake online stores, which, optimized for search engine visibility, trick victims...