Phishing remains the preferred technique among threat actorsPhishing is the primary method used by cybercriminals, with significant increases in sophisticated targeting techniques.
Urgent warning to all 1.8bn Gmail users over dangerous attackNew hack called Astaroth defeats two-factor authentication for Gmail users.
Google Calendar, Docs hit by info-stealing malware - here's how to safeguard your devicesMalware is targeting Google Calendars, Docs, and Slides through phishing schemes.Users are advised to be cautious with unsolicited invites and links.
Why 'malware as a service' is becoming a serious problemMalware as a service model is now a dominant mode of cybercrime, facilitating a substantial increase in detected threats.Phishing remains the primary method for initial access in growing malware campaigns.The surge in malware attacks is propelled by a flood of duplicated malware rather than a rise in new threats.
Hackers Exploit Signal's Linked Devices Feature to Hijack Accounts via Malicious QR CodesRussian-aligned threat actors are exploiting Signal's linked devices feature to compromise accounts through malicious QR codes.
A Signal Update Fends Off a Phishing Technique Used in Russian EspionageGovernments and users must be vigilant about cybersecurity threats, especially with encrypted messaging apps.Russian hackers have exploited Signal's QR code feature to conduct espionage.
Phishing remains the preferred technique among threat actorsPhishing is the primary method used by cybercriminals, with significant increases in sophisticated targeting techniques.
Urgent warning to all 1.8bn Gmail users over dangerous attackNew hack called Astaroth defeats two-factor authentication for Gmail users.
Google Calendar, Docs hit by info-stealing malware - here's how to safeguard your devicesMalware is targeting Google Calendars, Docs, and Slides through phishing schemes.Users are advised to be cautious with unsolicited invites and links.
Why 'malware as a service' is becoming a serious problemMalware as a service model is now a dominant mode of cybercrime, facilitating a substantial increase in detected threats.Phishing remains the primary method for initial access in growing malware campaigns.The surge in malware attacks is propelled by a flood of duplicated malware rather than a rise in new threats.
Hackers Exploit Signal's Linked Devices Feature to Hijack Accounts via Malicious QR CodesRussian-aligned threat actors are exploiting Signal's linked devices feature to compromise accounts through malicious QR codes.
A Signal Update Fends Off a Phishing Technique Used in Russian EspionageGovernments and users must be vigilant about cybersecurity threats, especially with encrypted messaging apps.Russian hackers have exploited Signal's QR code feature to conduct espionage.
Mobile phishing threats are evolving, according to new researchMobile phishing attacks are evolving, necessitating new security strategies to protect users on mobile devices.
Phishing campaign targets mobile devices via PDFsA new phishing attack targeting mobile users poses risks by hiding malicious elements in PDF files, exploiting trust and security weaknesses.
Mobile phishing threats are evolving, according to new researchMobile phishing attacks are evolving, necessitating new security strategies to protect users on mobile devices.
Phishing campaign targets mobile devices via PDFsA new phishing attack targeting mobile users poses risks by hiding malicious elements in PDF files, exploiting trust and security weaknesses.
Operation Heart Blocker: Disruption action deals blow to criminal cyber network HeartSenderThe HeartSender group was sophisticated, selling digital fraud tools globally, leading to significant law enforcement action.
Humboldt Independent Practice Association's breach notification leaves questions unansweredHumboldt IPA reported a data breach involving protected health information due to a phishing incident affecting one email account.
Operation Heart Blocker: Disruption action deals blow to criminal cyber network HeartSenderThe HeartSender group was sophisticated, selling digital fraud tools globally, leading to significant law enforcement action.
Humboldt Independent Practice Association's breach notification leaves questions unansweredHumboldt IPA reported a data breach involving protected health information due to a phishing incident affecting one email account.
Weird Duolingo Tweet Is Legit, But Don't Respond With Your Credit Card NumberDuolingo's marketing stunt mistakenly risks phishing by jokingly asking users for credit card information in a tweet.
39 cybercrime domains seized, linked to HeartSender cybercrime groupLaw enforcement dismantled 39 cybercrime domains associated with a Pakistan-based network selling phishing tools, marking a significant victory against BEC attacks.
New FlowerStorm Microsoft phishing service fills void left by Rockstar2FAFlowerStorm is emerging as a new PhaaS platform after the demise of Rockstar2FA, indicating an ongoing shift in the cybercrime landscape.
39 cybercrime domains seized, linked to HeartSender cybercrime groupLaw enforcement dismantled 39 cybercrime domains associated with a Pakistan-based network selling phishing tools, marking a significant victory against BEC attacks.
New FlowerStorm Microsoft phishing service fills void left by Rockstar2FAFlowerStorm is emerging as a new PhaaS platform after the demise of Rockstar2FA, indicating an ongoing shift in the cybercrime landscape.
How 'furious' consumer rights expert got snared by online hotel booking scammersBe cautious of fake emails after online bookings.Scammers can create convincing phishing attempts, even targeting well-known booking platforms.
Scammers love the holidays. Here's how to protect yourself.Scammers exploit the holiday season to perpetrate phishing and smishing attacks against online shoppers.