Malvertising targets Microsoft advertisers via fake Google ads, stealing credentials with phishing pages mimicking ...
Hackers hijack high-profile X accounts with phishing scams to steal credentials and promote fraudulent cryptocurrency schemes ...
Phishing attacks are getting more advanced by the day. To help protect yourself against them, we'll provide information about ...
TorNet connects infected machines to the TOR network for command and control (C2) communications and detection evasion.
The malicious PDFs redirect users to phishing websites, where they are prompted to provide details such as names, addresses ...
The campaign employs trusted platforms such as Amazon S3 and various Content Delivery Networks (CDNs) to host phishing sites, ...
French startup Riot has raised a $30 million Series B round after reaching $10 million in annual revenue in 2024. Originally ...
Veriti Research has uncovered a potentially growing cyber threat campaign surrounding the release of the declassified JFK, ...
Cofense Intelligence has continually observed the abuse or usage of legitimate domain service exploitation. This report highlights observed phishing threat actor abuse of .gov top-level domains (TLDs) ...
Use precise geolocation data and actively scan device characteristics for identification. This is done to store and access ...
Microsoft reports a phishing campaign by the criminal group Star Blizzard. It is attempting to take over WhatsApp accounts.