Phishing Attack Prevention Checklist – A Detailed Guide For 2024
Phishing attacks are online scams in which hackers pretend to represent reliable organizations to trick victims into disclosing private information like passwords or credit card numbers.
Attackers frequently use phony emails, texts, and websites to...
North Korean Posing as Recruiters to Attack Job Seekers Device
Hackers target job seekers primarily for financial gain and to obtain sensitive personal information.
Many job seekers are vulnerable due to their enthusiasm for finding employment, which exposes them to phishing scams and fake job...
Zendesk Email Spoofing Flaw Let Attackers Gain Access To Support Tickets
A severe vulnerability in Zendesk, a widely used customer service tool, has been exposed, allowing attackers to gain unauthorized access to sensitive support tickets of numerous Fortune 500 companies.
The flaw, discovered by a...
Beware of Smishing Attacks Aimed to Steal Personal Information
There has been an increase in the number of robotext scams in recent months, which has prompted the Federal Communications Commission (FCC) to issue a warning.
Scammers are increasingly using robotext scams to trick their...
CRON#TRAP Campaign Attacking Windows Machine With Weaponized Linux VMs
Weaponized Linux virtual machines are used for offensive cybersecurity purposes like "penetration testing" or "exploiting vulnerabilities." These setups often use the tools and frameworks that are designed for ethical hacking.
Securonix researchers recently detected CRON#TRAP...
Hackers Abuse Microsoft Office Forms to Launch Two-Step Phishing Attacks
Cybercriminals are increasingly using Microsoft Office Forms to launch sophisticated two-step phishing attacks. At present, certain individuals are being tricked into divulging their Microsoft 365 (M365) login information through Office Forms.
Threat actors use the technique...
Hackers Using Weaponized Word Documents In QR Code Phishing Attacks
Hackers often abuse weaponized Word docs, as they can contain macros that contain or exploit flaws inside those Word files to run destructive code upon being opened by the intended victims.
It enables an attacker...
Darkgate Malware Weaponizing XLSX, HTML, & PDF To Attack Windows Machines
Hackers often target XLSX, HTML, and PDF files as they are widely used, and their trustable file formats also attract them.
This makes it easier to deliver them successfully to recipients who may not be...
Beware Of Malicious PDF Files That Mimic Microsoft 2FA Security Update
Malware authors are exploiting the growing popularity of QR codes to target users through PDF files, where these malicious PDFs, often delivered via email disguised as faxes, contain QR codes that trick users into...
Hackers Attacking Sporting Events Via Fake Domains To Steal Logins
Cybercriminals leverage high-profile events, such as global sporting championships, by registering fake domains to launch phishing and scam attacks.
Researchers uncover suspicious domain registration campaigns, especially when event-specific terms or phrases are used in recently...