Convincing Microsoft phishing uses fake Office 365 spam alerts
A persuasive and ongoing series of phishing attacks are using fake Office 365 notifications asking the recipients to review blocked…
A persuasive and ongoing series of phishing attacks are using fake Office 365 notifications asking the recipients to review blocked…
A new phishing campaign has been targeting verified Twitter accounts, as seen by BleepingComputer. The phishing campaign follows Twitter's recent…
The BRATA Android remote access trojan (RAT) has been spotted in Italy, with threat actors calling victims of SMS attacks…
The Federal Bureau of Investigation (FBI) has revealed that the Cuba ransomware gang has compromised the networks of at least…
Report explores cybercrime developments from the second half of 2020 through the first half of 2021.
The entertainment industry has long had to deal with the challenge of protecting their high-value content and intellectual property. Enter…
Phishing actors have quickly started to exploit the emergence of the Omicron COVID-19 variant and now use it as a…
Newer top-level domains and certain hosting providers are frequent sources of malicious content, while newly registered domains and free SSL…
The notorious Emotet malware is now distributed through malicious Windows App Installer packages that pretend to be Adobe PDF software.…
APT actors from Russia, China, and India have been observed using the RTF-template injection technique that researchers say is poised…