Phishing Attacks

Beware Of Phishing Emails Prompting Execution Via Paste (CTRL+V)

Phishing attackers are distributing malicious HTML files as email attachments, containing code designed to exploit users by prompting them to…

6 months ago

New Android Malware Mimic As Social Media Apps Steals Sensitive Data

A new RAT malware has been discovered to be targeting Android devices. This malware is capable of executing additional commands…

7 months ago

StrelaStealer Malware Hacked 100+ Organizations Across The EU And U.S

Strelastealer malware has been found to be distributed in large-scale campaigns that have currently impacted over 100 organizations across the…

8 months ago

Hackers Install macOS Malware Using Weaponised Calendar Invites

Hackers use weaponized calendar invites to exploit vulnerabilities in email systems, tricking users into clicking on malicious links or downloading…

9 months ago

Most Important Cyber Attack Techniques often used by Hackers

Cyber attack occurs on a daily basis, and these can range from cyber attacks on tech giants to individuals falling…

1 year ago

5 Most Common Types of Phishing Attacks

You don’t have to look far for nightmare stories about hackers accessing data and these security breaches are often a…

3 years ago

Unpatched Address Bar Spoofing Flaw in UC Browser Exposes 600M Users to Phishing Attacks

An URL bar address spoofing vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of…

6 years ago

Dangerous PANDA Banking Malware Spreads Through Phishing Attacks Targets Banks, Cryptocurrency Sites and Social Media

The PANDA Malware first identified in the year 2016 by Fox IT, the malware primarily focused on banking sectors. With…

7 years ago