Cybercriminals are executing sophisticated phishing attacks targeting Microsoft 365 users by employing deceptive URLs that closely resemble legitimate O365 domains,…
Fraudsters in the Middle East are exploiting a vulnerability in the government services portal. By impersonating government officials, they target…
A phishing campaign spoofing the United States Social Security Administration emerged in September 2024, delivering emails with embedded links to…
Through the use of XLoader and impersonating SharePoint notifications, researchers were able to identify a sophisticated malware delivery campaign. A…
SpyLoan apps, a type of PUP, are rapidly increasing, exploiting social engineering to deceive users into granting excessive permissions, where…
Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in 2022 by employing sophisticated social engineering…
Callback phishing is a two-step attack involving phishing emails and phone calls. Victims are lured into calling a bogus number…
A forwarded Telegram video advertises heavily discounted, high-profile cryptocurrency projects, enticing viewers with links to a seemingly legitimate second-tier exchange…
Hackers continuously exploit malicious Python packages to attack developer environments and inject harmful code that enables them to steal sensitive…
Hackers exploit social engineering, which avoids technical security systems, by manipulating the psychology and behavior of a human being. Social…