Hackers targeted a hospital system in West Virginia; the attackers used a phishing attack for a data breach from the hospital’s system. Monongalia health…
phishing
Email is still vulnerable: Brute Force Attacks increasing
Emails are still a viable attack vector, despite the fact that phishing techniques are constantly being improved. Threat actors are using brute force attacks…
Outlook new One-click button eases employees to report the scam emails
For all Outlook using employees across the UK, detailing dubious mails to the National Cyber Security Center (NCSC) has never been simpler. With an…
Microsoft Teams App: New security for phishing attacks
Microsoft Teams app has acquired new Defender ‘Safe Links’ phishing security to ensure clients against possibly hazardous phishing URLs. The extra phishing security in…
PDF attachments a long line of Phishing Campaign
Robbing corporate credentials is a worthwhile business in the black markets. Attackers have been found to go to different lengths to get those. Presently,…
Facebook credentials of users found to be stolen by Android apps
Google interceded to eliminate nine downloaded Android applications more than 5.8 multiple times from the organization’s Play Store after the applications were found stealthily…
Nobelium Hackers Phishing Campaign Pretended as USAID; Microsoft
In the latest Microsoft research, it has been reported that following the USAID email account hacking incident, nation-backed Russian threat group Nobelium is now…
New STRRAT Malware Pretends To Be Ransomware; Microsoft Research
In the latest malware developments, Microsoft has newly alerted that a big email campaign is spreading STRRAT malware that is extorting sensitive data by…
Dridex trojan back in action
Dridex trojan is functional and dynamic once more; it has gotten back to phishing assaults disguising QuickBooks receipts. This continuous phishing effort began on…
New Downloader Malware “Saint Bot” Is Spreading Via Emails
A new malware downloader has been discovered by researchers that are using phishing attacks to advance credential infiltrators and other malicious payload malware. The…