Aspire Health, through its federal court record, has revealed that it was a victim of a nasty phishing attack through email that...
Customer Relationship Management vendor, Zoho went offline after its registrar applied for a suspension order, due to a phishing issue. TierraNet deliberately...
The focus today is on the Indian corporate scenario. The HackerCombat research team, ever on the go, has been analyzing the current...
In a recent statement Google said that it has disabled 39 YouTube Channels associated with Iranian state broadcaster, which is running a...
Georgia-based Augusta University Health has admitted for becoming the victim of a data breach back in 2017. In the data breach, personal...
Accusations about impending foreign intervention of the U.S. midterm elections are in the air, with President Trump and his administration at the...
Scammers continue to adapt with new techniques to trick user’s and make them fall as a victim. Scammers always impose limits such...
A modern phishing campaign focusing on the industrial sector appears once again and demonstrated how attackers are continually enhancing at attracting high...
The attacks of this phishing variant are becoming more and more frequent Enterprise network security researchers have detected a new wave of spear...
LifeLock, an Arizona-based identity theft protection firm may have exposed email addresses of millions of its customers – Simply put: A firm...
Russian agencies are linked to these campaigns Spear phishing attacks reappear in the media after the Justice Department formally accused 12 Russian...
A hidden bug found within an information management system may have compromised the data of 21,000 U.K. schools, who are all now...
Antimalware companies have made many innovations for many decades in order to keep individuals and enterprises secure from cyber risks. However, human...
Phishing is a classic favorite attack of hackers. Not only that it provides easy access to victims’ accounts by merely tricking them...
Phishing attacks have become a common occurrence in the digital age. While most of us already know what these email scams look...
It’s a big deal—not to mention highly-irritating—when computers become infected and lose valuable and sometimes irreplaceable files. A compromised server can leak...
The Football World Cup 2018 has gathered thousands of fans from around the world in Russia to watch their favorite team battling to...
You might have heard the word Social Engineering. But, what exactly is Social Engineering? What are the types of Social Engineering techniques?...
A majority of users and companies are moving to Two-factor authentication (2FA) for enhancing the security of its data and systems. But...
The Microsoft 365 Business suite has come up with some security enhancements designed to boost SMBs and their data. Microsoft recently added...
Man Sentenced to 87 Months in Prison for Hacking County Jail’s Records to Get Friend Released Early because “A Friend in Need...