Top 10 Phishing Techniques You Need to Know in 2024

This image is about top 10 phishing techniques for 2024.

Blog Phishing attacks use increasingly sophisticated techniques bolstered by cutting-edge technology and are increasingly effective at outfoxing all but the most discerning individuals and companies. In this blog post, we provide an in-depth look at the top 10 phishing techniques currently in use, dive into the technical details, and arm you with a set of […]

Microsoft Has Disrupted SEABORGIUM’s Ongoing Phishing Operation

This image is about Microsoft's disruption of SEABORGIUM's phishing operations.

Blog The Microsoft Threat Intelligence Center (MSTIC) has taken action and taken measures to disrupt the campaigns launched by the SEABORGIUM actor, which has been tracked since 2017. SEABORGIUM is a threat actor with goals aligned with the interests of the Russian state. SEABORGIUM is a threat actor that often targets the same organizations over […]

WordPress Sites Hacked with Fake Cloudflare DDoS Alerts

This image is about WordPress sites hacked with fake Cloudflare DDoS alerts.

Blog DDoS protection pages typically verify whether the site visitor is actually a human or part of a Distributed Denial of Service (DDoS) attack or other unwanted bot. Bad bots make up a large portion of web traffic. These include DDoS traffic, scrapers scavenging email addresses to send spam, bots trying to find vulnerable websites […]

Phishing Attack Targeting Turkish Companies

This image is about a phishing attack targeting Turkish companies.

Blog Phishing mail targeting Turkish companies has been detected.  Mail attachment contains an RFQ file. Normally, a request for quotation (RFQ) is a company’s document to request pricing and packaging information from a potential supplier. This RFQ-looking file is actually a RAR file. It contains a malicious EXE file that is simply a Keylogger and […]