TOP 12 Most Dangerous Types of Phishing Attacks 2022
Phishing is a type of cyberattack that is committed with the use…
Ukrainian law enforcement officers arrested members of the hacker group Phoenix
The Security Service of Ukraine (SBU) announced the arrest of five members…
Clop ransomware exploits vulnerability in SolarWinds Serv-U
The NCC Group warns of a spike of Clop ransomware attacks (hack…
Experts discovered ESPecter UEFI bootkit used for espionage
ESET experts discovered the previously unknown ESPecter UEFI bootkit, which was used…
Users can be lured to a malicious site through a vulnerability in Apple AirTag
Security researcher Bobby Rauch discovered a vulnerability in AirTag key fobs, which…
FlyTrap Android malware compromised over 10,000 Facebook accounts
According to experts from Zimperium, Android malware FlyTrap hijacks Facebook accounts in…
Evil Corp Ransomware Posing As PayloadBin Group To Avoid US Sanctions
Operators of new ransomware PayloadBIN, linked to the cybercriminal group Evil Corp,…
A competition at a hacker forum: $115,000 paid for new attack methods related to cryptocurrency
Intel 471 analysts discovered that at the end of April this year,…
Tencent and Chinese police conducted a joint operation against game cheat developers
Chinese police in collaboration with tech giant Tencent have launched a joint…
Ukrainian cyber police arrested the author of uPanel phishing kit
Ukrainian cyber police have arrested a 39-year-old man who is probably the…
LogoKit phishing kit allows creating phishing pages in real time
RiskIQ researchers said that the new LogoKit phishing kit was detected on…
Hackers majorly use Microsoft and DHL brands in phishing attacks
Hackers majorly use the Microsoft and DHL brands in phishing attacks. In…