Tag: phishing


  • Mandiant Warns: A Tool for Hackers Exploiting the WinRAR CVE-2025-8088 Threat

    Mandiant Warns: A Tool for Hackers Exploiting the WinRAR CVE-2025-8088 Threat

    Introduction: A Persistent WinRAR Weakness Security researchers at Mandiant have warned that a critical path traversal vulnerability in WinRAR, tracked as CVE-2025-8088, remains a serious hotspot for attackers. Despite a fix being released more than half a year ago, state-sponsored hackers and financially motivated adversaries continue to exploit the flaw via malicious archives and plausible…

  • Ten Brands Scammers Are Most Likely to Impersonate

    Ten Brands Scammers Are Most Likely to Impersonate

    Why impostor scams are so effective Impersonation scams rely on trust, urgency, and perceived authority. Scammers mimic familiar brands—think banks, social platforms, government agencies, and major retailers—because people are conditioned to respond quickly when a familiar name is involved. These attacks blend real-world concerns like account security, tax notices, and prize alerts with a veneer…

  • Emergency Patch Issued for Microsoft Office 365 Over Hacking Threat

    Emergency Patch Issued for Microsoft Office 365 Over Hacking Threat

    Urgent Security Update for Microsoft Office 365 An emergency security patch has been released for Microsoft Office and Office 365 amid a growing hacking threat that could compromise email, documents, and collaboration tools. Cybersecurity researchers and Microsoft’s security team warn that attackers are exploiting a zero-day or recently disclosed vulnerability to gain unauthorized access, exfiltrate…

  • Ten Brands Scammers Are Most Likely to Impersonate and How to Spot Them

    Ten Brands Scammers Are Most Likely to Impersonate and How to Spot Them

    Introduction: Why Impersonation Scams Target Trusted Brands Impersonation scams rely on trust. Scammers assume the identities of well-known brands and institutions to exploit the public’s familiarity and fear. From tech platforms to financial institutions and government agencies, criminals craft convincing messages designed to steal money, personal data, or access to accounts. Understanding which brands are…

  • Ten Brands Scammers Are Most Likely to Impersonate: How to Spot and Stop It

    Ten Brands Scammers Are Most Likely to Impersonate: How to Spot and Stop It

    Why Impersonation Scams Are So Effective Impersonation scams work because they tap into trust and urgency. Bad actors impersonate familiar brands to create a sense of legitimacy, prompting quick actions like revealing confidential information or wiring money. The internet makes it easy for these fraudsters to spoof emails, texts, and even phone calls, exploiting people’s…

  • Researchers Uncover Haxor SEO Poisoning Marketplace

    Researchers Uncover Haxor SEO Poisoning Marketplace

    New Findings Spotlight a Global Backlink Marketplace Security researchers have uncovered an expansive marketplace that weaponizes search engine optimization (SEO) tactics for illicit ends. Dubbed the “HaxorSEO” or “HxSEO” operation, the platform provides threat actors with a ready-made ecosystem to acquire, manage, and deploy backlinks designed to push malicious pages higher in organic search results.…

  • Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers

    Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers

    Overview: APT Konni Turns to AI-Generated PowerShell in Blockchain Attacks Security researchers have flagged a notable shift in the operation of the North Korean threat actor known as Konni. In recent campaigns, Konni has leveraged AI-assisted tools to generate PowerShell payloads that form backdoors aimed at blockchain developers and engineering teams. The attacker group appears…

  • Konni Hackers Use AI-Generated PowerShell Backdoor to Target Blockchain Developers

    Konni Hackers Use AI-Generated PowerShell Backdoor to Target Blockchain Developers

    Overview A North Korean threat actor known as Konni has been observed deploying a PowerShell-based backdoor generated with artificial intelligence to target blockchain developers and engineering teams. The campaign, which has focused on Japan among other regions, underscores an emerging trend where cybercriminal groups leverage AI-assisted tooling to craft more convincing malware payloads and phishing…

  • GCash Introduces In-App OTPs to Thwart Phishing and Fraud

    GCash Introduces In-App OTPs to Thwart Phishing and Fraud

    GCash rolls out in-app OTPs to boost security GCash, the Philippine finance superapp, has announced the rollout of a new security feature: in-app One-Time Passwords (OTPs). The update is designed to strengthen protection against phishing scams, fraudulent transactions, and unauthorized access. By delivering OTPs directly within the app, GCash aims to create a faster, more…

  • 1Password Unveils Phishing Prevention Feature to Reduce Ransomware Risk

    1Password Unveils Phishing Prevention Feature to Reduce Ransomware Risk

    New Phishing Prevention Feature from 1Password Aims to Shield Businesses Phishing remains one of the most significant cybersecurity threats facing businesses today. A successful attack can cost a company millions, with IBM reporting an average loss of about $4.8 million per incident. In response, 1Password is rolling out a new phishing prevention feature designed to…