Showing 61 to 72 of 154 results


Steganography-Based Phishing Campaign Delivers RemcosRAT Malware
A new phishing campaign delivers RemcosRAT malware via a fake SWIFT payment confirmation PDF containing a malicious link hidden within an image using steganography, leading to a multi-stage infection process.
Steganography-Based Phishing Campaign Delivers RemcosRAT Malware
A new phishing campaign delivers RemcosRAT malware via a fake SWIFT payment confirmation PDF containing a malicious link hidden within an image using steganography, leading to a multi-stage infection process.
Progress
40% Bias Score


Gmail's End-to-End Encryption: Enhanced Security Creates New Phishing Risks
Google's new end-to-end encryption for Gmail, while improving security for Gmail users, creates a new vulnerability for non-Gmail users who receive encrypted emails via a restricted Gmail interface, increasing the risk of phishing attacks mimicking legitimate invitations.
Gmail's End-to-End Encryption: Enhanced Security Creates New Phishing Risks
Google's new end-to-end encryption for Gmail, while improving security for Gmail users, creates a new vulnerability for non-Gmail users who receive encrypted emails via a restricted Gmail interface, increasing the risk of phishing attacks mimicking legitimate invitations.
Progress
48% Bias Score


Google's Encrypted Gmail: Security Risks Outweigh Benefits
Google's new end-to-end encrypted Gmail feature, while seemingly enhancing security, creates vulnerabilities by requiring users to access encrypted emails via a restricted Gmail version, increasing the risk of phishing attacks impacting its 3 billion users.
Google's Encrypted Gmail: Security Risks Outweigh Benefits
Google's new end-to-end encrypted Gmail feature, while seemingly enhancing security, creates vulnerabilities by requiring users to access encrypted emails via a restricted Gmail version, increasing the risk of phishing attacks impacting its 3 billion users.
Progress
60% Bias Score


Gmail Phishing Attack Bypasses Google Security; 7-Day Recovery Window
A new Gmail phishing attack uses an OAuth application and a "creative DomainKeys Identified Mail workaround" to bypass Google's security, prompting Google to release updated protections; users have seven days to recover their accounts if compromised.
Gmail Phishing Attack Bypasses Google Security; 7-Day Recovery Window
A new Gmail phishing attack uses an OAuth application and a "creative DomainKeys Identified Mail workaround" to bypass Google's security, prompting Google to release updated protections; users have seven days to recover their accounts if compromised.
Progress
52% Bias Score


Google Confirms Sophisticated Phishing Attack; Urges Users to Abandon Passwords
On April 19, Google confirmed a sophisticated phishing attack exploiting platform vulnerabilities that bypassed security warnings by using valid DKIM signatures in emails from no-reply@google.com. The attack targeted an Ethereum developer, prompting Google to urge users to abandon passwords and enab...
Google Confirms Sophisticated Phishing Attack; Urges Users to Abandon Passwords
On April 19, Google confirmed a sophisticated phishing attack exploiting platform vulnerabilities that bypassed security warnings by using valid DKIM signatures in emails from no-reply@google.com. The attack targeted an Ethereum developer, prompting Google to urge users to abandon passwords and enab...
Progress
44% Bias Score


Surge in Unpaid Toll Scams via Text Message
Over 60,000 unpaid toll scam complaints were filed last year; scammers use texts with seemingly real numbers and fake email addresses, often including links to fraudulent websites; McAfee found a quadrupling of these scams between January and February.
Surge in Unpaid Toll Scams via Text Message
Over 60,000 unpaid toll scam complaints were filed last year; scammers use texts with seemingly real numbers and fake email addresses, often including links to fraudulent websites; McAfee found a quadrupling of these scams between January and February.
Progress
20% Bias Score

Typosquatting: Risks and Prevention
Typosquatting involves registering domain names that closely resemble legitimate websites to deceive users into visiting malicious sites, potentially leading to malware infections, data theft, and financial fraud.

Typosquatting: Risks and Prevention
Typosquatting involves registering domain names that closely resemble legitimate websites to deceive users into visiting malicious sites, potentially leading to malware infections, data theft, and financial fraud.
Progress
12% Bias Score

AI-Powered Phishing Attack Bypasses Microsoft 365 MFA
A new phishing attack, "SessionShark O365 2FA/MFA," bypasses Microsoft Office 365's multi-factor authentication by stealing user session tokens; this attack uses AI to create realistic phishing pages and is being sold as an educational tool, highlighting the need for stronger authentication methods ...

AI-Powered Phishing Attack Bypasses Microsoft 365 MFA
A new phishing attack, "SessionShark O365 2FA/MFA," bypasses Microsoft Office 365's multi-factor authentication by stealing user session tokens; this attack uses AI to create realistic phishing pages and is being sold as an educational tool, highlighting the need for stronger authentication methods ...
Progress
40% Bias Score

Gmail Security Update Addresses Sophisticated Phishing Attack
Gmail suffered a sophisticated phishing attack that bypassed security measures by using a seemingly legitimate email from Google requesting account details; Google has since patched the vulnerability and provided a four-step response plan.

Gmail Security Update Addresses Sophisticated Phishing Attack
Gmail suffered a sophisticated phishing attack that bypassed security measures by using a seemingly legitimate email from Google requesting account details; Google has since patched the vulnerability and provided a four-step response plan.
Progress
36% Bias Score

Gmail Phishing Attack Exploits Infrastructure Weakness, Highlighting Need for Passkeys
A new Gmail phishing attack exploited a vulnerability in Google's infrastructure, sending legitimate-looking emails from a Google address to a credential-phishing page; this highlights the increasing sophistication of AI-powered attacks and the need for stronger authentication like passkeys.

Gmail Phishing Attack Exploits Infrastructure Weakness, Highlighting Need for Passkeys
A new Gmail phishing attack exploited a vulnerability in Google's infrastructure, sending legitimate-looking emails from a Google address to a credential-phishing page; this highlights the increasing sophistication of AI-powered attacks and the need for stronger authentication like passkeys.
Progress
44% Bias Score

Microsoft Leads Passkey Push to Combat AI-Powered Cyberattacks
AI-powered cyberattacks are on the rise, prompting Microsoft to lead a campaign to replace passwords with passkeys for over a billion accounts, significantly enhancing security against phishing and credential theft.

Microsoft Leads Passkey Push to Combat AI-Powered Cyberattacks
AI-powered cyberattacks are on the rise, prompting Microsoft to lead a campaign to replace passwords with passkeys for over a billion accounts, significantly enhancing security against phishing and credential theft.
Progress
48% Bias Score

Tax Deadline Phishing Attack Targets Microsoft Accounts
Cybercriminals are using phishing emails with malicious QR codes disguised as tax return reminders to steal Microsoft account credentials before the April 15th US tax deadline, leveraging the urgency of the deadline to increase the success rate of their attacks.

Tax Deadline Phishing Attack Targets Microsoft Accounts
Cybercriminals are using phishing emails with malicious QR codes disguised as tax return reminders to steal Microsoft account credentials before the April 15th US tax deadline, leveraging the urgency of the deadline to increase the success rate of their attacks.
Progress
44% Bias Score
Showing 61 to 72 of 154 results