In recent years, cryptocurrencies have gained a lot of attention as an investment opportunity, with more and more people getting involved in the market.…
phishing
The 0ktapus Phishing Attack: Campaign: The Most Prolific Phish
Global cybersecurity leader, Group-IB, has discovers that 9,931 thousand accounts from over 130 organisations were under compromise. It was because of a massive phishing…
UK government sounds alarm on tax scams
As people get ready to file their 2020–2022 tax returns, the UK government has issued a warning to be on the lookout for phoney…
Attacks by BazarCall Callback Phishing Continually Adapt Their Social Engineering Techniques
The individuals who created the BazaCall callback phishing technique have kept up with new social engineering techniques to spread malware on targeted networks. The…
All Hackers Can Utilize Sophisticated Phishing Techniques Thanks To The New EvilProxy Service
With the promise of stealing authentication tokens to get around multi-factor authentication (MFA) on Apple, Google, Facebook, Microsoft, Twitter, GitHub, GoDaddy, and even PyPI.…
Data Breach in West Virginia Hospital
Hackers targeted a hospital system in West Virginia; the attackers used a phishing attack for a data breach from the hospital’s system. Monongalia health…
Email is still vulnerable: Brute Force Attacks increasing
Emails are still a viable attack vector, despite the fact that phishing techniques are constantly being improved. Threat actors are using brute force attacks…
Outlook new One-click button eases employees to report the scam emails
For all Outlook using employees across the UK, detailing dubious mails to the National Cyber Security Center (NCSC) has never been simpler. With an…
Microsoft Teams App: New security for phishing attacks
Microsoft Teams app has acquired new Defender ‘Safe Links’ phishing security to ensure clients against possibly hazardous phishing URLs. The extra phishing security in…
PDF attachments a long line of Phishing Campaign
Robbing corporate credentials is a worthwhile business in the black markets. Attackers have been found to go to different lengths to get those. Presently,…