Top 10 Phishing Techniques You Need to Know in 2024
Blog Phishing attacks use increasingly sophisticated techniques bolstered by cutting-edge technology and are increasingly effective at outfoxing all but the most discerning individuals and companies. In this blog post, we provide an in-depth look at the top 10 phishing techniques currently in use, dive into the technical details, and arm you with a set of […]
Microsoft Has Disrupted SEABORGIUM’s Ongoing Phishing Operation
Blog The Microsoft Threat Intelligence Center (MSTIC) has taken action and taken measures to disrupt the campaigns launched by the SEABORGIUM actor, which has been tracked since 2017. SEABORGIUM is a threat actor with goals aligned with the interests of the Russian state. SEABORGIUM is a threat actor that often targets the same organizations over […]
WordPress Sites Hacked with Fake Cloudflare DDoS Alerts
Blog DDoS protection pages typically verify whether the site visitor is actually a human or part of a Distributed Denial of Service (DDoS) attack or other unwanted bot. Bad bots make up a large portion of web traffic. These include DDoS traffic, scrapers scavenging email addresses to send spam, bots trying to find vulnerable websites […]
The fake ‘Internet Download Manager’ Chrome Extension Has Been Downloaded Over 200,000 Times
Blog The adware ‘Internet Download Manager’ Google Chrome extension has been installed by more than 200,000 users. According to reviews, this extension has been on the Chrome Web Store since June 2019. The extension has been observed to exhibit undesirable behavior. For example, opening links to spammy sites, changing the default browser search engine. According […]
Phishing Attack Targeting Turkish Companies
Blog Phishing mail targeting Turkish companies has been detected. Mail attachment contains an RFQ file. Normally, a request for quotation (RFQ) is a company’s document to request pricing and packaging information from a potential supplier. This RFQ-looking file is actually a RAR file. It contains a malicious EXE file that is simply a Keylogger and […]