Cybercrime has penetrated deep into the corporate world. Even though corporate organizations and enterprises are doing their best to keep hackers at bay, the threat actors somehow manage to stay one step ahead.
Commuting from one place to another isn’t just time-consuming but can also feel heavy on your pocket. No, this is not about the rising prices of gasoline. In a serious turn of events, a new and alarming type of smishing incident has been sweeping across all the states of the USA.
There’s a new kid named CoralRaider in the block of Vietnamese cyber criminals. These cyber attackers have targeted Asian organizations and brands with the aim of gaining access to social media account details and sensitive user data. The specialty of CoralRaider lies in seamless data extraction through legitimate services and social engineering tactics.
Phishing scams have become commonplace and have intruded into our everyday lives in ways beyond our imagination. Commoners, as well as A-listers across the globe, have fallen prey to phishing scams.
Threat actors around the globe are in no mood to hold their horses back. They have been using all the tricks they have up their sleeves. From loopholes in modern technology to emotional persuasion, they try everything to break into someone’s bank account. Slightest negligence and BOOM- these fraudsters will gain access to your most sensitive details!
Hacking instances are rampant across the globe, and this time, the target is none other than the Federal Communications Commission or FCC. There’s a new kid on the block named CryptoChameleon, and this brand-new phishing kit is being used to attack the FCC employees. Basically, the threat actors are using CryptoChameleon to come up with SSO pages that resemble Okta to a great extent.
It came as a shocker when the former Director of Investigation at the esteemed National Crime Agency got sacked because of her “misconduct.” Touted as a “serious information security breach,” Nikki Holland’s careless actions had grave consequences in terms of her career.
Phishing attacks have become quite rampant over the last few decades. And the latest victim is none other than the esteemed co-founder of Nest Wallet- Bill Lou. He fell prey to a phishing scam whereby he lost a whopping $125,000.
Cybercriminals have always managed to stay ahead of the cyber security experts in terms of their ability to swiftly adapt to the everchanging technological dynamics. Phishing attacks are getting more sophisticated with time- thanks to the advent of artificial intelligence and its easy accessibility.
Threat actors deploy multiple vectors to launch their cyberattack campaigns. Learn about recent attacks involving email phishing, server compromise, and credential-stealing malware.
There is a significant rise in IPFS phishing attacks in 2023, causing a considerable stir in the digital landscape. Read on to learn about IPFS phishing attacks, including their types and modus operandi, and how to stay secure from their clutches.
The latest in the crypto-cybersecurity landscape is the loss of around $6 million from about 5,000 people in a case of a phishing-as-a-service campaign by ‘Inferno Drainer.’ Read on to know everything about the incident.
Here is a close look into the details of the OCBC phishing scam, how it happened, the damage it caused, how OCBC handled it, and the masterminds behind it.
In one of the latest phishing scams, malicious actors are impersonating popular platforms like PayPal and MetaMask to target unsuspecting victims. The gravity of this cyber onslaught has been intense enough to prompt theFederal Trade Commission (FTC) to warn internet users.
US mobile carrier giant T-Mobile suffered another breach just four months into 2023, where the threat actors could use identity theft and spear phishing against the victims. Join us as we share the T-Mobile data breach, how it happened, what data was accessed, and how to get phishing protection.
Undoubtedly, famous public cloud services providers like Amazon, Google, Microsoft, and Western Digital offer a more secure cloud environment than on-premise servers. But what if the hackers target them, locking you out and hampering productivity? Follow this article to learn about the latest attack on Western Digital.
Western Digital recently announced today that an unauthorized party breached its network, gaining access to its multiple company systems. After discovering the breach, the firm launched an investigation into the incident (which is in the early stages) and informed the law enforcement authorities.
A major security breach has recently hit the US Marshals Service, putting sensitive information at risk, according to senior law enforcement officials. Learn more about the details of the breach, how it happened, the data at risk, and the steps being taken to address it.
The US Marshals Service was hit by a major security breach this month, with hackers breaking into and stealing data from a computer system that contained personal information about investigative targets and agency employees, as confirmed by a spokesman for the service on Monday.
TELUS, the Canadian telecom giant, is investigating a potential data breach after a threat actor leaked what appears to be employee data and source code. TELUS has initiated an investigation in response to the breach to assess the scope of the incident and safeguard its customers and staff from any potential risks. Stay updated with the latest developments on this incident with this article as we share what happened, how it happened, and what TELUS is doing.
In today’s constantly evolving threat landscape, attackers are always on the lookout for the next opportunity to obtain valuable personal data, making everyone vulnerable to phishing attacks regardless of their industry or sector. In this week’s update, we bring you the latest news stories related to phishing and data breaches.
In the latest cybersecurity breach news, web hosting giant GoDaddy has revealed that malicious actors have been stealing its source code for several years. This article shares a look at the multi-year data breach campaign and describes how you can protect yourself if you use a hosting service.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.