In today's interconnected world, where digital communication and transactions dominate, phishing attacks have become an ever-present threat. By masquerading as…
SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from screenshots stored on infected devices. …
A recent advanced malware campaign leverages a phishing attack to deliver a seemingly benign Excel file that exploits CVE-2017-0199. By…
Researchers identified a campaign distributing Remcos RAT, a Remote Access Trojan, where the attack uses phishing emails disguised as legitimate…
An infostealer disguised as the Adobe Reader installation has been observed. The file is disseminated in PDF format and prompts users…
Bolster's threat research team recently discovered an extensive brand impersonation effort targeting over 100 well-known clothes, footwear, and apparel firms.…
A phishing attack that involved mimicking a browser-based file archiver software like WinRAR using a .zip domain to enhance its…
Telegram is becoming an increasingly popular platform for users as well as cyber-criminals. It has become a Mini Dark-web since…
There was an extensive phishing campaign that took advantage of YouTube as a vehicle for promoting the download and installation…
With the release of the PhaaS platform called 'Caffeine', threat actors can now easily launch their own sophisticated phishing attacks.…