phishing

Scattered Spider Attacking Finance & Insurance Industries WorldWideScattered Spider Attacking Finance & Insurance Industries WorldWide

Scattered Spider Attacking Finance & Insurance Industries WorldWide

Hackers very frequently target the finance and insurance sectors due to the large volumes of sensitive data that they own.…

12 months ago
North Korean Hackers Abuse DMARC To Legitimize Their EmailsNorth Korean Hackers Abuse DMARC To Legitimize Their Emails

North Korean Hackers Abuse DMARC To Legitimize Their Emails

DMARC is targeted by hackers as this serves to act as a preventative measure against email spoofing and phishing attempts. …

1 year ago
Microsoft Two-Step Phishing Campaign Attack LinkedIn UsersMicrosoft Two-Step Phishing Campaign Attack LinkedIn Users

Microsoft Two-Step Phishing Campaign Attack LinkedIn Users

The professional and personal online spheres are merging as social media platforms like Facebook, LinkedIn, and WhatsApp are now commonly…

1 year ago
5 Major Phishing Campaigns in March 20245 Major Phishing Campaigns in March 2024

5 Major Phishing Campaigns in March 2024

March saw many notable phishing attacks, with criminals using new tactics and approaches to target unsuspecting victims. It is time…

1 year ago
Werewolf Hackers Exploiting WinRAR Vulnerability To Deploy RingSpy BackdoorWerewolf Hackers Exploiting WinRAR Vulnerability To Deploy RingSpy Backdoor

Werewolf Hackers Exploiting WinRAR Vulnerability To Deploy RingSpy Backdoor

Active since 2023, the Mysterious Werewolf cluster has shifted targets to the military-industrial complex (MIC) by using phishing emails with…

1 year ago
iPhone Users Beware! Darcula Phishing Service Attacking Via iMessageiPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information and grant unauthorized access. It's an…

1 year ago
Hackers Abuse Telegram API To Exfiltrate User InformationHackers Abuse Telegram API To Exfiltrate User Information

Hackers Abuse Telegram API To Exfiltrate User Information

Attackers have been using keywords like "remittance" and "receipts" to spread phishing scripts using Telegram to steal user data indiscriminately.…

1 year ago
Phishing Attack Prevention: Best 10 Ways To Prevent Email Phishing AttacksPhishing Attack Prevention: Best 10 Ways To Prevent Email Phishing Attacks

Phishing Attack Prevention: Best 10 Ways To Prevent Email Phishing Attacks

No one wants to believe they’d fall victim to phishing attacks. However, phishing attacks are on the rise and are…

2 years ago
New Crypto Phishing Attack Steals Funds from Cold WalletsNew Crypto Phishing Attack Steals Funds from Cold Wallets

New Crypto Phishing Attack Steals Funds from Cold Wallets

Cryptocurrency's rising fame and diverse storage methods expand the arsenal of tools used by threat actors chasing digital assets and…

2 years ago
Letscall – New Sophisticated Voice over IP Phishing Attack Steal Banking DetailsLetscall – New Sophisticated Voice over IP Phishing Attack Steal Banking Details

Letscall – New Sophisticated Voice over IP Phishing Attack Steal Banking Details

Vishing's popularity has surged significantly in recent years, and this phenomenon is gradually destroying the trust factor in unknown calls…

2 years ago