Phishing Attacks

Hackers Install macOS Malware Using Weaponised Calendar InvitesHackers Install macOS Malware Using Weaponised Calendar Invites

Hackers Install macOS Malware Using Weaponised Calendar Invites

Hackers use weaponized calendar invites to exploit vulnerabilities in email systems, tricking users into clicking on malicious links or downloading…

1 year ago
Most Important Cyber Attack Techniques often used by HackersMost Important Cyber Attack Techniques often used by Hackers

Most Important Cyber Attack Techniques often used by Hackers

Cyber attack occurs on a daily basis, and these can range from cyber attacks on tech giants to individuals falling…

2 years ago
5 Most Common Types of Phishing Attacks5 Most Common Types of Phishing Attacks

5 Most Common Types of Phishing Attacks

You don’t have to look far for nightmare stories about hackers accessing data and these security breaches are often a…

3 years ago
Unpatched Address Bar Spoofing Flaw in UC Browser Exposes 600M Users to Phishing AttacksUnpatched Address Bar Spoofing Flaw in UC Browser Exposes 600M Users to Phishing Attacks

Unpatched Address Bar Spoofing Flaw in UC Browser Exposes 600M Users to Phishing Attacks

An URL bar address spoofing vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of…

6 years ago
Dangerous PANDA Banking Malware Spreads Through Phishing Attacks Targets Banks, Cryptocurrency Sites and Social MediaDangerous PANDA Banking Malware Spreads Through Phishing Attacks Targets Banks, Cryptocurrency Sites and Social Media

Dangerous PANDA Banking Malware Spreads Through Phishing Attacks Targets Banks, Cryptocurrency Sites and Social Media

The PANDA Malware first identified in the year 2016 by Fox IT, the malware primarily focused on banking sectors. With…

7 years ago