blog
  1. Home
  2. /
  3. Blog
SurveyMonkey Phishers Go Hunting for Office 365 Credentials

SurveyMonkey Phishers Go Hunting for Office 365 Credentials

SurveyMonkey Phishers Go Hunting for Office 365 Credentials Security researchers are warning of a new phishing campaign that uses malicious emails from legitimate SurveyMonkey domains in a bid to ...
95% of Brits Unable to Consistently Identify Phishing Messages

95% of Brits Unable to Consistently Identify Phishing Messages

95% of Brits Unable to Consistently Identify Phishing Messages Just 5% of Brits are able to recognize all scam emails and texts, a study from Computer Disposals Limited has found. Scam emails ...
Fraudsters Conducting Malvertising Campaign Via Inactive Domains

Fraudsters Conducting Malvertising Campaign Via Inactive Domains

Fraudsters Conducting Malvertising Campaign Via Inactive Domains A number of inactive websites have been compromised and are redirecting visitors to unwanted URLs, many of which are malicious. This ...
UK Stalkerware Usage Soars During Lockdown

UK Stalkerware Usage Soars During Lockdown

UK Stalkerware Usage Soars During Lockdown Anti-malware company Avast saw a sharp spike in the use of stalkerware during the UK’s pandemic lockdown, it revealed this week. Installations of online ...
Researchers Find New Calendar-Based Phishing Campaign

Researchers Find New Calendar-Based Phishing Campaign

Researchers Find New Calendar-Based Phishing Campaign Researchers have once again spotted crooks using calendar invitations to mount phishing attacks. The Cofense Phishing Defense Center found the ...
Unauthorized Data Sharing Puts Companies at Risk

Unauthorized Data Sharing Puts Companies at Risk

Unauthorized Data Sharing Puts Companies at Risk Inappropriate data sharing continues to be a problem for companies, according to a survey from data discovery and auditing software vendor Netwrix. ...
Criminals Exploit Pandemic with Brute-Force RDP Attacks

Criminals Exploit Pandemic with Brute-Force RDP Attacks

Criminals Exploit Pandemic with Brute-Force RDP Attacks ESET is the latest security company to notice a sharp spike in RDP-based hacks over the last few months. The anti-malware company spotted a ...
Businesses Lack a Workable Ransomware Recovery Strategy

Businesses Lack a Workable Ransomware Recovery Strategy

Businesses Lack a Workable Ransomware Recovery Strategy More than a third of businesses do not have a ransomware emergency plan in place, or are not aware if one exists within their company. ...
NCSC: One Million Phishing Messages Reported in Two Months

NCSC: One Million Phishing Messages Reported in Two Months

NCSC: One Million Phishing Messages Reported in Two Months The National Cyber Security Centre (NCSC) has announced that in just two months of its Suspicious Email Reporting Service being launched, ...
Twitter Data Leak Exposes Business Clients

Twitter Data Leak Exposes Business Clients

Twitter Data Leak Exposes Business Clients Twitter has contacted its business clients to warn them of a potential breach of their data. It said that email addresses, phone numbers and the last four ...

Menu