Phishing Attacks
TheMoon Botnet Facilitates Faceless To Exploit EoL Devices
In a digital landscape fraught with threats, vigilance is paramount. The cybercriminals are exploiting End-of-Life devices to perpetrate their malicious activities. Recently, Black Lotus Labs, the formidable threat intelligence arm of Lumen ...
Malicious Google Ads Targeting Chinese Users – Stay Informed
Online scams through Google ads continue to pose a significant threat to internet users worldwide. Malicious actors continuously evolve their strategies to exploit vulnerabilities and target unsuspecting users. Recently, a concerning trend ...
From Phishing to Friendly Fraud: Anticipating 2024’s Fraud Dynamics
Planning for emerging fraud trends can help you stay a step ahead of criminals’ new tactics, protect your revenue and customer relationships ...
Cloud Atlas Phishing Attacks: Russian Companies Beware
The landscape of cybersecurity threats 2024 presents unprecedented challenges, requiring a proactive and adaptive approach to safeguard digital ecosystems. This brings us to a recent cyber espionage incident. The famous hacker group ...
Alert: Carbanak Malware Strikes Again With Updated Tactics
Recent reports have highlighted the return of the Carbanak Malware. As per the reports, it’s a banking malware used in ransomware attacks that leverages updated tactics for increased effectiveness. As of now, ...
WinRAR Flaw: LONEPAGE Malware Strikes Ukrainian Firms
In the realm of cybersecurity, vigilance is paramount, and recent developments reveal a persistent threat facing Ukrainian entities. In mid-2023, the Ukrainian CERT issued advisory #6710, unmasking a threat actor identified as ...
Why Cybersecurity Needs To Be an SMB Priority
SMBs are low-hanging fruit for cybercriminals because they have limited IT resources, staff and cybersecurity defenses ...
How to Build a Phishing Playbook Part 1: Preparation
Automating response to phishing attacks remains one of the core use-cases of SOAR platforms. In 2022, the Anti-Phishing Working Group (APWG) logged ~4.7 million phishing attacks. Since 2019, the number of phishing ...
Securing the Democratic Narrative: Cybersecurity in Election Promotion
Introduction In the contemporary political landscape, election promotion has evolved beyond traditional campaign rallies and grassroots initiatives. The digital era has ushered in a new era of outreach, where social media, online ...
Phishing With Dynamite
Token stealing is getting harder. Instead, stealing whole logged-in browser instances may be an easier and more generic approach. One attack, known as “browser-in-the-middle” (BitM), makes it possible to virtually place a ...