Spear Phishing used for Carbanak campaigns
The Carbanak group is infamous for infiltrating various financial institutions, and stealing millions of dollars by learning and abusing the internals of […]
Do you know how they hacked your account? Part one: Downloading the infection
A cyber-attack is classified as any type of offensive action used by cyber criminals to deploy malicious code in your system with […]
SMShing : Don’t let new tactics get you phished!
Evolving and progressing in life goes hand in hand. One must always make efforts to progress so life doesn’t get stagnant. However, […]
Make anti-phishing solutions ride shotgun in your company’s modus operandi
A person is always very particular and vigilant when it comes to his or her close one’s secrets. They try to protect […]
How to save yourself from falling into the “phishing trap”?
When we hear the word Phishing, what image do we visualize exactly? Don’t we see a fisherman, sitting with a fishing stick […]
How to discern Santa disguised phishers this holiday?
Holiday season is around which means the season of sending and receiving gifts and pleasantries is here as well. According to a […]
Emotet malware being presented to people this Christmas, through Greta Thunberg themed Phishing emails
A global spam email scheme has been discovered which is using Swedish environmental activist Greta Thunberg themed emails to lure users. Spam […]
Online fraud : Darker side of online payment services
Shopping has never been so much fun until online services invaded our lives. Of course, shopping seems so easy and convenient when […]
Phishing: Watch out for phishers | Salvage from misadventure
Phishing has increasingly become a pervasive problem within the digital world. It can be defined as an act of forging a website […]
Phishing: Online Brand Impersonation
Brand Impersonation is a kind of phishing attack where attackers claim to be from a product/service that is known. They send out […]
Reason to invest in Anti-Phishing Solutions
Phishing is an attempt to obtain a company’s confidential data by acting as a trusted authority via messages, messengers, or any other […]