Darcula Phishing Scam Alert
A new phishing-as-a-service (PhaaS) named ‘Darcula’ has emerged, utilizing 20,000 domains to impersonate brands and target Android and iPhone...
Read moreA new phishing-as-a-service (PhaaS) named ‘Darcula’ has emerged, utilizing 20,000 domains to impersonate brands and target Android and iPhone...
Read moreA cyber-espionage campaign targeting Indian government agencies and the energy sector has been unveiled by researchers, utilizing a modified...
Read moreUK authorities have intensified their efforts to combat fraud through Operation Henhouse, resulting in hundreds of arrests and the confiscation...
Read more
Passwords are the primary method of authentication for most online accounts, including email, social media, banking, and shopping accounts.
Read moreHow to protect your online privacy? Use a different password for every account, and make sure that each password is long and complex.
Read moreWinter Vivern is a cyberespionage group to have been active since at least 2020 and it targets governments in Europe...
Volt Typhoon has been active since at least 2021 and primarily targets U.S government and defense organizations for intelligence-gathering purposes.
DarkCasino was discovered in 2021 and has launched attacks against banks, cryptocurrency platforms, gambling sites and casinos, and stock trading...
MuddyWater is a cyber espionage group assessed to be a subordinate element within Iran's Ministry of Intelligence and Security (MOIS).
Andariel is a North Korean state-sponsored threat group that has primarily focused its operations against South Korean government agencies.
ShadowSyndicate is an opportunistic, financially-motivated threat actor, active since July 2022, who was linked with various ransomware strains such as...
Also known as vulnerability assessment, a vulnerability analysis is a systematic examination of an information system or product to determine the adequacy of security...
Stealth viruses are a type of computer virus that actively attempts to hide its presence and activities on an infected...
Web skimming attacks, also known as formjacking, occur when malicious script is injected into sites to steal information entered into...
BIFROSE malware are backdoors that often arrive on systems either downloaded by users when visiting malicious sites or downloaded by...
Bitfrost collects the victim's hostname, IP address, and process IDs, then uses RC4 encryption to secure it before transmission to...
It is a computer worm that infected over ten million Windows personal computers. It started spreading as an email message...