Please turn on your JavaScript for this page to function normally.
hand
Manipulation tactics that you fall for in phishing attacks

It’s 6 p.m. on a Friday. Just as you finish packing up for the day, an email from your boss pops up on your phone asking why an urgent payment didn’t go out earlier in the …

Google Chrome
Tech support scammers leverage “evil cursor” technique to “lock” Chrome

Tech scammers are constantly coming up with new techniques to make users panic and seek their bogus services. The latest one, documented by Malwarebytes researchers, has been …

Verizon
Verizon details breaches they were called in to investigate

If at all possible, organizations like to keep details of the breaches they suffered under wraps, mostly to safeguard their reputation and to minimize legal trouble. As …

hole
Security researchers sinkholed EITest infection chain

Security researchers have managed to neutralize “EITest,” one of the oldest infection chains and thus preventing as many as two million potential malicious …

person
How the human factor puts your company at risk

Positive Technologies has released a new report with statistics on the success rates of social engineering attacks, based on the 10 largest and most illustrative pentesting …

email
Understanding email fraud: Do you have visibility into email threats?

82% of boards are concerned with email fraud, and 59% consider it a top security risk – no longer just an IT issue. Yet 30% of respondents to a survey conducted by …

BEC scams
BEC scammers actively targeting Fortune 500 companies

Nigerian scammers are targeting Fortune 500 companies, and have already stolen millions of dollars from some of them, IBM Security researchers have found. Their strategy is …

Telegram
How cybercriminals exploited Telegram flaw to deliver malware

A “vulnerability” in Telegram’s desktop instant messaging client for Windows was exploited for months by Russian cybercriminals to deliver malware to users. …

phishing
Industries most at risk of phishing attacks revealed

A new KnowBe4 study of phishing statistics for top industries, shows small insurance companies have the highest percentage of phish-prone employees in the small to mid–size …

mask
British teenager hacked top ranking US officials using social engineering

How did British teenager Kane Gamble, who at the time was only 15 years old, manage to break into email accounts of the CIA and DNI chiefs, as well as gain access to a number …

biohazard
Locky ransomware returns with new tricks up its sleeve

Locky ransomware is back, again, delivered with the help of new tricks to fool users and anti-malware defenses. Massive spam campaign Delivered through one of the largest spam …

biohazard
Attackers turn to auto-updating links instead of macros to deliver malware

SANS ISC handler Xavier Mertens has flagged and analyzed a malicious Word file that, somehow, is made to automatically download an additional malicious RTF file, ultimately …

Don't miss

Cybersecurity news