Tag: phishing

Google Research: Phishing Poses the Greatest Cybersecurity Threat

A new study by Google has revealed insights to better explain how emails and other accounts are hacked and hijacked by malicious hackers. A 12-month study wherein Google partnered the University of...

Read more arrow_forward

Hackers Find a New Way to Attack Nuclear Plants: Template Injection

Hackers have leveraged phishing, a long successful method to execute cyberattacks, with a template file over an SMB connection to discreetly harvest the victim’s credentials. Security researchers...

Read more arrow_forward

Nearly 50% of Organizations are Victims of Ransomware Attacks

A new study has revealed that ransomware attacks targeting organizations continue to be one the rise, with 47% of organizations revealing that they have been victims of a ransomware attack over the...

Read more arrow_forward

Google Docs Users Hit with Massive Phishing Attack

On Wednesday morning (PST), users of the popular Google Docs software suite were targeted in a comprehensive phishing campaign that allowed attackers to obtain victims’ contact lists while accessing...

Read more arrow_forward

Lithuanian Phishing Scammer Tricks US Tech Giants to Wire Him $100 Million

An indictment by the Department of Justice has revealed that a Lithuanian man tricked two US-based internet companies to wire him a total of over $100 million through a phishing scam. 48-year-old...

Read more arrow_forward

Cunning Gmail Phishing Attack is Even Tricking Savvy Users

A new Gmail-targeting phishing attack is fooling account owners into giving malicious hackers access to their Gmail accounts. The attack works with hackers sending emails to contacts of compromised...

Read more arrow_forward

Clever Dropbox Phishing Scam

Phishing campaigns just got much more believable.

Read more arrow_forward

JP Morgan Infiltrated by Obtaining Just One Employee's Password

New reports on the JP Morgan Chase case indicate that hackers initially gained access to just a single employee's password through which they gained access to a vulnerable server. From...

Read more arrow_forward