The threat actor known as Winter Vivern has been observed exploiting a zero-day flaw in Roundcube webmail software on October 11, 2023,...
A broad range of threat actors, including Fancy Bear, Ghostwriter, and Mustang Panda, have launched phishing campaigns against Ukraine, Poland, and other...
Still, Ransomware attacks become a problem on local governments, and Texas discovers this first-hand. On the morning of August 16, 23 government...
One of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit...
GreatHorn, an incident-response consulting firm has released their Email Security, Challenges, Trends and Benchmark Report 2019 revealing that the corporate world and...
Last Valentines day, we made a fearless declaration here in Hackercombat.com, that Trickbot is shaping itself of becoming the “malware of the...
Ever since email came into existence in the 1990s and the high level of awareness of the risks involved, 94% of the...
Being the president of a Fortune 500 company is something many people aspire to be. The perks of the position go beyond...
The phishing definition from the United States Computer Emergency Readiness Team, or US-CERT, says that this is a form of social engineering...
The cyber attack occurs on a daily basis, and these can range from attacks on tech giants to individuals falling foul to...
A massive data breach has hit Canva, the Australian tech unicorn based in Sydney. It was ZDNet that reported, on May 24,...
Phishing attacks against businesses offering SaaS (Software-as-a-service) and web-based email services have increased considerably in the first quarter of the current year,...
An URL bar address spoofing vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of users to...
In a bid to improve its phishing protections and to protect users from MITM attacks, Google has come up with a new...
Phishing is a way to extract confidential data from individuals and businesses. Mostly by creating fake Web pages or send emails...
Phishing attacks via emails are pretty common these days for which cybercriminals have new ways of luring users into falling prey to...
Hackers are now using IMAP protocol to hack Office 365 and G Suite cloud accounts, bypassing multi-factor authentication; and these kinds of...
Gmail, from Google, is one of the main services that use this login method Network security and ethical hacking specialists from the International...
Phishers are in a huge advantage these days with the growth of social media platforms such as Facebook, Twitter, Instagram, and even...
Nokia is a failed brand in the west, including in their native Finland since the emergence of the 2007 smartphone named Apple...
Hackers see the healthcare industry as a lucrative target for hackers, why we say so is because we have seen this happening...