Home Tags Phishing

Tag: phishing

Securing ‘Digital India’ With a Zero Trust Approach

0
What are some of the biggest challenges facing countries across the globe today? Technology is transforming human societies and communities across the globe, in...

How U.S. Defense Contractor Electronic Warfare Associates Fell Prey to Phishing

0
A U.S. government defense contractor, Electronic Warfare Associates (EWA), was a victim of a data breach due to an email phishing incident. Per a...

Cybersecurity Awareness Month 2021: Here’s What the Experts Have to Say

0
Like every year, CISA and the National Cyber Security Alliance (NCSA) are hosting the National Cybersecurity Awareness Month 2021 in the U.S. to raise...

“Incident Response professionals are working in a high-paced and stressful environment”

0
At the beginning of 2021, when the cybersecurity community was reeling from the aftereffects of the SolarWinds supply chain attack, a new ransomware strain...

Russia-linked APT28 Phishes 14,000 Gmail Users in a State-sponsored Phishing Campaign

0
APT28, a threat group attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165, is targeting...

Ongoing Credential Harvesting Campaign Targets Government Agencies in APAC, EMEA

0
Security researchers uncovered a widespread credential harvesting campaign targeting government agencies across seven countries in the Asia-Pacific (APAC), Europe, and the Middle East and...

3 Ways the Federal Government Is Using Technology to Advance Cybersecurity

0
When it comes to cybersecurity, the federal government is putting out fires every day — and it can be exhausting. Like most organizations, the...

The Importance of Team Diversity in Detecting Phishing Scams

0
An email subject line catches a user’s interest. The user clicks through and gets compromised. This is a classic phishing attack; it remains one...

Phishing Alert! XSS Vulnerability in UPS.com Distributes Malicious Invoice

0
Phishing is one of the most popular social engineering techniques cybercriminals use to distribute malware and steal personal information. As per recent reports, fraudsters...

Everything You Need to Know About the Evolution of Cyberthreats

0
The theory of evolution proposed by Charles Darwin is based on the concept of change in characteristics of a population over successive generations. An...

MOST POPULAR

RECENT POSTS