A new report out today from zLAbs, the security research arm of mobile security platform provider Zimperium Inc., warns of a ...
Attackers lured victims into clicking on malicious content through fake court appeals, fake deals, counterfeit official ...
Why? Because a phishing attack doesn’t have to evade the operating system or hide from your antivirus. It only has to fool ...
The Darcula phishing-as-a-service (PhaaS) platform is preparing to release its third major version, with one of the ...
Russian threat actors have been launching phishing campaigns that exploit the legitimate "Linked Devices" feature in the ...
Hackers hijack high-profile X accounts with phishing scams to steal credentials and promote fraudulent cryptocurrency schemes ...
Kaspersky’s security solutions blocked over 893-million phishing attempts in 2024 – a 26% increase from 2023, when the total stood at nearly 710-million. The surge in attempts (shown in the graph ...
After clicking, they are taken to a fake Microsoft OneDrive login page, where the threat actor captures their user credentials. Phishing is the primary method attackers use to infiltrate and ...
Zimperium, the global leader in mobile security, today released new research highlighting the evolving landscape of mobile phishing attacks. The data-driven analysis of mobile phishing vectors in 2024 ...
Phishing campaign mimics CAPTCHA to deliver hidden malware commands PowerShell command hidden in verification leads to Lumma Stealer attack Educating users on phishing tactics is key to preventing ...
The phishing-as-a-service kit from Sneaky Log creates fake authentication pages to farm account information, including two-factor security codes. Security researchers at French firm Sekoia ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results