EHA
LabHost Employs Phishing-as-a-Service to Steal banking Credentials

LabHost Employs Phishing-as-a-Service to Steal Banking Credentials

LabHost group has been discovered to be targeting Canadian Banks with Phishing-as-a-service attacks. Phishing-as-a-service (PhaaS) groups have been on the rise due to multiple tools capable of multiple features, such as access to an...
Hackers Exploit Trusted Platform Redirect Flaws To Launch Phishing Attacks

Hackers Exploit Trusted Platform Redirect Flaws For Phishing Attacks

Attackers abuse trustworthy platforms for redirection, which involves the use of legitimate websites to redirect users to harmful URL destinations. In this ever-evolving world of cyber threats, phishing attempts are getting more frequent, with email being...
The Invisible Threat: How Phishing Undermines Business Security

The Invisible Threat: How Phishing Undermines Business Security

In an era where technology intertwines intricately with every facet of business operations, cybersecurity emerges as a buzzword and a cornerstone of organizational integrity. But have you ever considered how vulnerable your business might...
QR code phishing

What is QR Code Phishing? (Quishing) – Attack & Prevention Guide in 2024

QR code Phishing, or "Quishing," is a cyber threat that exploits the widespread use of QR (Quick Response) codes in phishing attacks.  Quishing takes advantage of the recent high-use volume and increasing popularity of QR...
What is Phishing Attack? How it Works & How to Prevent Yourself?

What is Phishing Attack? How it Works & How to Prevent Yourself?

Phishing attacks are a sort of cybercrime in which the perpetrators attempt to trick users into divulging critical information by posing as a reliable entity in an electronic contact by using deception. These kinds...
Hackers Using Crypto Drainers in Sophisticated Phishing Attacks

Hackers Using Crypto Drainers in Sophisticated Phishing Attacks

The cryptocurrency industry has had a concerning rise in sophisticated phishing attacks. By employing a crypto wallet-draining technique, these threats are distinct in that they target a broad spectrum of blockchain networks, from Ethereum and Binance Smart...
New Instagram Phishing Attack Steals 2FA backup Codes

New Instagram Phishing Attack Steals 2FA Backup Codes

A new phishing campaign targeting Instagram users has been discovered, which uses several different techniques to lure victims into phishing websites and steal Instagram's two-factor backup codes. The threat actors use the “Copyright Infringement” template...
CISA Announces New Logging Made Easy Tool for Windows-based devices

CISA Announces New Logging Tool for Windows-based Devices

The Cybersecurity and Infrastructure Security Agency (CISA) has launched a new version of Logging Made Easy (LME), a free and simple log management solution for Windows-based devices.  LME is based on a technology developed by...
U.S. Government Releases Popular Phishing Technique used by Hackers

U.S. Government Releases Popular Phishing Technique Used by Hackers

Phishing is a cyberattack that uses deception to trick people into giving away sensitive information or taking actions that compromise security.  Phishing is often the first stage of a larger attack that can lead to...
Threat Actors Employ Remote Admin Tools to Gain Access over Corporate Networks

Threat Actors Employ Remote Admin Tools to Gain Access over Corporate Networks

Recently, threat actors have adapted tactics, exploiting the appeal of banned apps in specific regions, making users more susceptible to cyberattacks through cleverly crafted campaigns. In a recent campaign, Chinese users were lured with a...

Managed WAF

Website

Latest News