The phishing email claims that WeTransfer has shared two files with the victim, and there’s a link to view them. According to...
In the 3rd quarter of 2020, around 38% of all downloadable malware were found hidden in Office documents – In the first...
According to cybersecurity specialists, in collaboration with an ethical hacker from the International Institute of Cyber Security, malicious hackers are showing special...
attackers targeting legacy protocols with stolen credential dumps to increase the speed and efficiency of the brute force attacks. Based on Proofpoint...
Hackers are now using IMAP protocol to hack Office 365 and G Suite cloud accounts, bypassing multi-factor authentication; and these kinds of...
A new security flaw uncovered in Office 365 dubbed baseStriker puts 100 Million Email Users at risk. With this vulnerability, attackers can...
Ransomware is one of the most important threats facing Internet users. Its rate alerts much to both companies and users. Hackers take...