Cyber attacks are evolving, thanks to cybercriminals who are equipping themselves with new skills and capabilities – In this scenario, from business...
So far, the ongoing phishing attack has utilized more than 350 unique domains to target Microsoft Office 365 users. Microsoft has warned about...
The phishing email claims that WeTransfer has shared two files with the victim, and there’s a link to view them. According to...
LA County resident booked in iCloud phishing scam pretended to be an Apple representative. A Los Angeles County man identified as Hao...
According to researchers, cybercriminals are abusing legitimate challenge and response services like Google’s reCAPTCHA or deploying customized fake CAPTCHA-like validation. Palo Alto...
Phishing is getting smarter. A type of social engineering attack in which the attacker uses fraudulent messages that are designed to fool...
In the latest LinkedIn phishing scam, the sender’s email address appears to be from Paul University which is based in Nigeria. Phishing...
The email contains varying subject lines revolving around “order shipping” with messages instructing users to install the patch released by Microsoft. A...
In yet another sign that the Russian hackers who breached SolarWinds network monitoring software to compromise a slew of entities never really...
Many movies and other media may have a bit of a warped idea of what hackers do, exactly. But one show that...
Gaming is a multi-billion industry that is why it is a lucrative target for cybercriminals as well. Gaming giants on the other...
Microsoft has disclosed that the SolarWinds hackers or SolarWinds supply chain attack-fame threat actors are back in action. This time, they are targeting...
No matter how strong a company’s defense systems are, it’s critical that they include comprehensive employee training for all employees. Imagine that...
The website was scamming users in the name of providing the COVID-19 vaccine but actually collecting their personal data for malicious purposes....
If installed; the fake and malicious WhatsApp pink app takes full control of a targeted device. An unusual baiting technique has appeared...
The malware is also capable of controlling the device’s front and back camera to take photos periodically. The IT security researchers at...
ToxicEye is a new remote access Trojan (RAT) malware that has been used for more than 130 attacks over the past three...
Phishing, which started off as Nigerian Prince scams in the 1990s, has become a common attack vector ever since. As though phishing...
A prolific phishing kit distribution network dubbed “16Shop” believed to be active since 2018 and developed by a hacking group called the...
People often make a great effort to protect their credit/debit card details against fraudulent transactions. This has been further helped by banks...
If you’ve updated your Windows today like me, this article may just end up scaring you a bit. In the latest, it...