Threat Summary Malicious actor TA505 known for these notorious campaigns namely info stealer malware Dridex, the Locky ransomware, and more. Another attack carried out by the same group on multiple continents, including North America, Asia, Africa, and South America. Primarily focusing on large financial organizations, this group at the same time perform well-planned, advanced attacks...Continue Reading
The world-renowned fitness platform – Bodybuilding.com has suffered a data breach in which personal data of registered users has been accessed. The breach was identified in February 2019 and after conducting an investigation it was revealed that it was a result of a phishing attack carried out in July 2018. Although the exact number of...Continue Reading
What is up with the app? Cybercriminals who take advantage of people through social engineering techniques are now prowling within WhatsApp. Noticeably these threat actors are largely targeting Middle Eastern countries using company logos, and preset messages to lure victims in giving out crucial information. What are the styles of messages? From fake lottery winners...Continue Reading
The most common phishing attacks can often be quite convincing, but some more technologically-aligned users recognize something isn’t right when they see that the login form is unsecured or the SSL certificate doesn’t match the company being impersonated. Nevertheless, there is a new phishing attack that stores their phishing form on Azure Blob Storage, so...Continue Reading
Malicious cyber attackers steal user credentials by tricking unsuspecting users into using their login information on engineered fake websites. By hijacking an existing login page or creating an accurately similar login website that you can’t tell it apart from the authentic site, attackers easily gain access to the target network. Organized phishing operations, in which...Continue Reading
Phishing via Misspelling Phishing, no matter what form it takes is now considered to be the #1 security threat affecting users and their devices. While most phishing techniques have remained a stable cyber-attack over the years, affecting users on computers for as long as the internet has been around, hackers have learned to take advantage...Continue Reading
Cheating Winner Malware Winner Is there by any chance that you like to play multiplayer competitive games online, like Fortnite and PUBG? Then most players who are competitive in skills and spirit encounter overeager players who are taking advantage of glitches and cheats provided by 3rd party unauthorized programs. This trend has been going on...Continue Reading
Phishing attacks in the cyber world is relentless as ever, because of new vulnerabilities with the evolution of technology. We can’t deny that these threats exist, because victims are gaining in numbers and falling prey to Android Banking Malware which is being used for phishing activities. It is not a surprise that techniques are combined...Continue Reading
Sophisticated Spear Phishing: Customized Phishing Attacks Our Phishing Intelligence team noticed that sophisticated phishing attacks are more likely to occur these days targeting corporate employees and their contacts in their email addresses. This is commonly known as Spear Phishing is needed. Basically this type of phishing attack is devised by doing a thorough research on specific targets,...Continue Reading
Surprised? A Phishing modus designed to take your Apple ID password from you. A lot of people still claims that the iOS is Malware proof and/or is attack proof that is what majority of the people know since most users just want the simplicity of using their phones from their pockets. Advertisements and the media are...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.