Generative Data Intelligence

Tag: phish

Nespresso Domain Serves Up Steamy Cup of Phish, No Cream or Sugar

A phishing campaign exploiting a bug in Nespresso's website has been able to evade detection by taking advantage of security tools that fail to...

Top News

Accenture and SandboxAQ Collaborate to Help Organizations Protect Data

PRESS RELEASENEW YORK; Jan. 16, 2024 – Accenture (NYSE: ACN) and SandboxAQ are partnering to deliver artificial intelligence (AI) and quantum computing solutions to help organizations...

Hospitality Hackers Target Hotels’ Booking.com Logins

Cyberattackers are hitting the digital road, looking to make some virtual stops at various hotels that contract with Booking.com to sell rooms. The idea...

10 Years After Yahoo, What’s Changed? (Not Much)

In September 2016, Yahoo copped to a breach of 500 million user records. Even today it's one of the top five biggest data breaches...

5 Essential Insights from the ‘Microsoft Digital Defense Report 2023’

Since 2005, Microsoft has released annual security intelligence reports, now known as the "Microsoft Digital Defense Report," as a way to track evolving cybersecurity...

Telekopye: Chamber of Neanderthals’ secrets

We recently published a blogpost about Telekopye, a Telegram bot that helps cybercriminals scam people in online marketplaces. Telekopye can craft phishing websites, emails,...

Imperial Kitten APT Claws at Israeli Industry with Multiyear Spy Effort

A group with links to Iran has been conducting watering-hole attacks against Israeli transportation, logistics, and technology sectors over the last two years, an...

Bitdefender Labs Finds Surge In Halloween Scams

Tyler Cross Published on: October 27, 2023 Researchers with Bitdefender’s Antispam Labs have found a startling surge in...

Iran APT Targets the Mediterranean With Watering-Hole Attacks

A threat actor sponsored by the Islamic Republic of Iran has been using watering-hole attacks, with a new malware downloader and a budding new...

Largest Cryptocurrency Hacks In History: How They Happened

As cryptocurrency’s use and influence spread, the industry has become big business for investors, corporations, wallets, custodians, exchanges, and, unavoidably, hackers. One of the...

QR Code 101: What the Threats Look Like

As QR codes have become ubiquitous, their proliferation has given rise to new and emerging security risks.More than 80% of US-based QR code users...

How to Mitigate Cybersecurity Risks From Misguided Trust

Kroll's "2023 State of Cyber Defense" report includes some noteworthy findings about today's cybersecurity landscape. First, despite experiencing an average of five significant security...

Microsoft Teams Hacks Are Back, As Storm-0324 Embraces TeamsPhisher

In a campaign carried out this summer, an initial access broker (IAB) used an open source red-team tool to phish organizations via Microsoft Teams,...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?