phishing
-
Tech & Gadgets
This new phishing strategy uses GitHub comments to spread malware
Github repositories are becoming infected with malware Trusted repositories can bypass secure web gateways Github comments are also used to…
Read More » -
Tech & Gadgets
Phishing your own people during a cybersecurity training? How to protect the brands you use as bait
The widespread use of generative AI has made phishing an even greater threat to organizations. Hyper-realistic emails, texts and deepfake…
Read More » -
Tech & Gadgets
Beware: OpenAI is being spoofed as part of a major phishing attack
New research from Barracuda has revealed Threat actors are now using OpenAI in impersonation campaigns targeting companies around the world.…
Read More » -
Tech & Gadgets
Microsoft 365 accounts targeted in dangerous new phishing scam
Security experts have warned of a new phishing-as-a-service (PhaaS) platform that is emerging as a serious threat, thanks to its…
Read More » -
Tech & Gadgets
It’s official: NordVPN has taken protection against malware and phishing to the next level
So it’s official: NordVPN is the best VPN we’ve tested when it comes to blocking malware and phishing. The recently…
Read More » -
Tech & Gadgets
QR code phishing is taking it to a new level, so be on the lookout
Be careful when receiving emails with QR codes because Quishing (phishing with QR codes) has evolved to be as dangerous…
Read More » -
Tech & Gadgets
Companies are facing mobile phishing more than ever
Experts warn that hackers are now focusing their new phishing attacks on mobile devices, which are generally weaker and more…
Read More » -
Tech & Gadgets
Fake CAPTCHA pages are being used to hack your computer
Lumma Stealer, a recently identified information-stealing malware, is being distributed to users via fake human verification pages. According to researchers…
Read More » -
Tech & Gadgets
One of Microsoft’s most niche software tools hit by major phishing scam
According to experts, cybercriminals are using Microsoft Sway to host landing pages used in phishing campaigns. Cybersecurity researchers at Netskope…
Read More »