This is how the new Emotet spam email looks like
The operators of the dangerous Emotet malware attacked again after almost a year of inactivity, this time in the form of a spam campaign that aims to deliver malicious filesRead More →
The operators of the dangerous Emotet malware attacked again after almost a year of inactivity, this time in the form of a spam campaign that aims to deliver malicious filesRead More →
Through a statement, the developers of the Robinhood trading app confirmed the detection of a security incident that involved access to some client records by an unauthorized third party. TheRead More →
In its latest security alert, the Federal Bureau of Investigation (FBI) recommends users stay on top of a fraudulent scheme affecting cryptocurrency ATMs and payment QR codes. Cybercriminals seem toRead More →
Researchers at security firm Proofpoint recently spotted a malicious campaign deployed by the cybercriminal group identified as TA575 in which the Dridex malware variant is distributed using a theme fromRead More →
Cybersecurity specialists from Abnormal Security report the detection of at least 200 malicious emails as part of a phishing campaign targeting Microsoft Office 365 users. Apparently, the primary goal ofRead More →
For a few weeks now, the TV series ‘The Squid Game’ has become a phenomenon of popularity among Netflix users around the world and, as usual, threat actors are alreadyRead More →
Avanan cybersecurity specialists report the detection of a new phishing method in which threat actors look for susceptible targets among low-ranking employees who have access to an organization’s IT structure.Read More →
Cybersecurity specialists report the detection of a new attack method on non-fungible token (NFT) sale platforms and cryptocurrency wallets such as OpenSea and MetaMask through a malicious file. These areRead More →
Through a letter sent via email, Google has notified some 14,000 Gmail users that during the past months they could have been the target of a sophisticated spear phishing campaignRead More →
A research published by Ben Gurion University in Israel points to the discovery of a new mechanism for stealthily extracting data from air-gapped systems using Ethernet cables in these environmentsRead More →