Beware of Vacation-Related Scams: 4 Most Prevalent Types
Email scam actors constantly try to pick a better disguise for their…
ChatGPT has become a New tool for Cybercriminals in Social Engineering
Artificial intelligence has become an advanced tool in today's digital world. It…
What is Business Email Compromise (BEC) Attack?
Business email compromise attack, or shortly BEC, is a relatively new vector…
Attackers Can Use .Zip and .Mov Domains for Phishing
Experts' fears that attackers will use new .zip and .mov domains for…
GoDaddy Refund Phishing Emails Spread Infostealer
Hackers started using GoDaddy Refund Emails as a disguise to trick the…
Fake Windows Update in Browser Deliver Aurora Stealer
Fake Windows Update became a malware spreading way once again. Updates are…
APT43 Funds Cybercrime With Stolen Crypto
Researchers have identified a new state-backed hacker group in North Korea. The…
Financial Assistance Department Email Scam to call (855)-XXX-XXXX
Email is one of the oldest ways to exchange information over the…
ImBetter: New Information Stealer Spotted Targeting Cryptocurrency Users
Today, phishing sites are commonplace. But unfortunately, this seemingly old, deceptive tactic,…
СhatGPT Became a Source of Phishing
As the digital world continues to evolve, so do the tactics of…
Domain Registrar Namecheap Sent Phishing Emails to Its Customers
Domain registrar Namecheap's email was hacked last weekend and the company sent…
Microsoft Will Block Excel XLL Files Downloaded from the Internet
Microsoft developers are going to block some Excel add-in (.XLL) files for…