Information Security Threats in Social Media
Social media has become an important aspect of our everyday lives in…
Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site
With the ever-increasing number of cyber threats, hackers and cybersecurity specialists are…
Fake Ads on Facebook Promote Scam AI Services
Facebook has been hit by a wave of fake ads that offer…
WormGPT Helps Cybercriminals to Launch Sophisticated Phishing Attacks
SlashNext noticed that cybercriminals are increasingly using generative AI in their phishing…
Credentials Theft is On The Rise
Email spam has become the prevalent form of phishing and malware spreading…
Cloud Mining Scams Spread Banking Trojans
It's no secret that cybercriminals are increasingly using mobile platforms as an…
Beware of Vacation-Related Scams: 4 Most Prevalent Types
Email scam actors constantly try to pick a better disguise for their…
ChatGPT has become a New tool for Cybercriminals in Social Engineering
Artificial intelligence has become an advanced tool in today's digital world. It…
What is Business Email Compromise (BEC) Attack?
Business email compromise attack, or shortly BEC, is a relatively new vector…
Attackers Can Use .Zip and .Mov Domains for Phishing
Experts' fears that attackers will use new .zip and .mov domains for…
GoDaddy Refund Phishing Emails Spread Infostealer
Hackers started using GoDaddy Refund Emails as a disguise to trick the…
Fake Windows Update in Browser Deliver Aurora Stealer
Fake Windows Update became a malware spreading way once again. Updates are…