Cybersecurity News | QUICK READ
New PayPal Phishing Kit Hijacks WordPress Sites
Attackers Utilize Fake Security Checks to Obtain Victims’ PII.
Cybersecurity News | QUICK READ
Phishing Campaign Uses Reverse Tunnels and URL Shorteners
This Makes Stopping Malicious Activities More Difficult.
Cybersecurity News | QUICK READ
A Vulnerability Allowing Almost Anyone to Send Emails from Uber.com Was Discovered
The Vulnerability Was Apparently Ignored.
Cybersecurity News | QUICK READ
Espionage Hacking Campaign Is Targeting Telecom Operators
Middle Eastern and Asian Telecommunications and IT Service Companies Are Being Targeted.
Cybersecurity News | QUICK READ
YouTube Used to Push Password-Stealing Malware
The Nefarious Attackers Are Creating YouTube Videos in an Attempt to Distribute Password-stealing Trojans.
Cybersecurity News | QUICK READ
Threat Actors Used Morse Code to Avoid Detection
Microsoft Researchers Revealed on That Threat Actors Have Turned to Morse Code in a Year-Long Phishing Campaign.
Cybersecurity News | QUICK READ
FBI Is Warning Investors of Fraudsters Posing as Brokers
The Scheme Tries to Lure the Targets Into Investment Scams by Using Spoofed Sites, Fake Social Media Profiles, Cold Calling, and Doctored Documents.
Cybersecurity News | QUICK READ
Emails from 27 US Attorneys’ Offices Breached by the SolarWinds Hackers
Email Accounts of Employees from 27 US Attorneys’ Offices Got Breached by the Russian Foreign Intelligence Service (SVR).
Cybersecurity News | QUICK READ
New PayPal Credential Phishing Scam Conducted Via Live Chat Service
Although the Attack Does Not Look Entirely Sophisticated at First Glance, It Can Be Used to Acquire Victims’ Addresses, Phone Numbers, and Financial Information.
Cybersecurity News | QUICK READ
Scammers Are Now Pretending to be Online Support Agents via Live Chat Platforms
A New Phishing Scheme in Which the Scammers Are Posing as Customers and Contacting Live-Chat Support Agents Is Gaining Popularity.
Cybersecurity News | QUICK READ
A Fake Kaseya Security Update Is 'Backdooring' Networks Using Cobalt Strike
The Malicious Actors Are Pushing Cobalt Strike Payloads Disguised as Kaseya VSA Security Updates.
Cybersecurity News | QUICK READ
An Unusual File Attachment Is Being Used in Phishing Attacks
In an Attempt to Bypass Security Software Threat Actors Are Using the WIM Format.
Cybersecurity News | QUICK READ
Scammers Are Mailing Fake Ledger Devices to Steal Cryptocurrency
The Company Warns Users to Not Connect the Device to the Computer and Never Share the Recovery Phrase with Anyone.
Cybersecurity News | QUICK READ
AmeriGas Discloses 8-Second Data Breach
Although the Attack Lasted Briefly, It Managed to Impact 123 Company Employees.
Cybersecurity News | QUICK READ
Internet Domains Used by APT29 in Phishing Attacks Seized by the US
Two Internet Domains Used by Nobelium in Recent USAID Phishing Attacks Were Seized by the US Department of Justice.
Cybersecurity News | QUICK READ
Scam Alert! Unsubscribe Spam Emails Used by Spammers to Confirm Legitimate Email Accounts
These Unsubscribe Emails Only Cause Further Spam.
Cybersecurity News | QUICK READ
North Korean Hackers Most Likely to Have Been Behind the CryptoCore Heists
Security Researchers Have Attributed Multiple Attacks on Cryptocurrency Exchanges to CryptoCore.
Cybersecurity News | QUICK READ
Phishing Attack Has Targeted Domain Group Site Users
A Scam that Used a Phishing Attack to Gain Access to Domain’s Administrative Systems Was Identified.
Cybersecurity News | QUICK READ
FBI: Victims Lost $4.2 Billion to Cybercriminals in 2020
The FBI’s Internet Crime Complaint Center (IC3) Has Observed A Significant Increase in Cybercrime Complaints Over the Past Five Years.
All things Heimdal | QUICK READ
Heimdal™ AI Discovers a Complex Phishing Cryptocurrency Scam Campaign
The Cryptocurrency Scam Operators Have Been Preparing Their Malicious Campaign Months in Advance. Victims Defrauded of 0.3 ETH and Face Long-term Risks as Well.
Cybersecurity Basics | QUICK READ
What Is SSL Vulnerability In Computer Network Science?
Vulnerabilities of the SSL/TLS Protocol. Most Common SSL Attacks.
Cybersecurity Basics | QUICK READ
What Is Residual Risk in Information Security?
The Importance of Residual Risk. How To Manage your Residual Risk?
Security alerts | QUICK READ
New Microsoft Phishing Campaign Targets Office365 Users
Links to the phishing domains come from compromised accounts (including LinkedIn). How hackers combine tactics in an advanced phishing threat.
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats