phishing - search results

If you're not happy with the results, please do another search

Google Chrome now offers phishing and malware protection

For those prioritizing a secure browsing experience, here's some promising news: Google has announced that Chrome users utilizing the safe browsing mode will now...
phishing attacks image

SIM linked data security measure to defend against phishing attacks

Stolen bank account credentials have been a persistent issue in countries like Britain, the United States, Australia, and Canada, often resulting in significant financial...

Difference between Whale Phishing and Spear Phishing

Whale phishing and Spear phishing are both forms of targeted cyber-attacks aimed at stealing sensitive information or gaining unauthorized access to systems. However, they...
AI Cyber Threat Image

Spear Phishing attacks on Microsoft365 and Azure Accounts

Microsoft, the renowned technology giant based in the United States, has recently made headlines due to targeted spear phishing campaigns aimed at thousands of...

Mandiant suffers phishing attack on its X Account and exposes CLINKSINK malware

Mandiant, a threat intelligence company affiliated with Google Cloud, recently made headlines as it fell victim to a hacking group orchestrating crypto-related phishing campaigns....

Deep dive into synthetic voice phishing (vishing) defense

In a survey conducted by TrueCaller Insights, it was revealed that over 68,000 Americans fell victim to financial fraud through phone scams in 2022....

What is Simulated Phishing

Simulated Phishing refers to the practice of creating fake or simulated phishing attacks to test and assess the vulnerability of individuals or organizations to...

Report Phishing and Spam messages on Google in this way

The use of smartphones has surged over the past five years, attributed to the convenience and services they offer to users. Whether it's booking...

Understanding and Safeguarding against QR Code Phishing Attacks aka Quishing

QR code phishing also known as 'Quishing' is a cyberattack that leverages Quick Response (QR) codes to deceive individuals into revealing sensitive information or...

Dangers of Deep Sea Phishing – A Dive Into a Real-World Attack

By Michael Angelo Zummo, Threat Intel Expert – CybersixgillPhishing tools and services are common and accessible on the underground. We took a close look...

NEW REPORTS