Email scams and attacks continue to be increasingly harmful to organizations. Therefore, it is a general rule to avoid sending sensitive information v . . . Read more
Emotet is a Trojan that is spread primarily through phishing emails. It can be executed from a malicious script, macro–enabled document files or . . . Read more
What is a bot? A bot, short for robot, is a software application that runs simple automated tasks at high performance rates. There are some…
. . . Read more
What is Zeoticus Ransomware? Zeoticus ransomware was first spotted for sale in various underground markets and forums in early 2020. It is a ransomwar . . . Read more
Social Networking sites have become more and more popular among teenagers and young adults, simply for the reason that it connects people from across . . . Read more
Introduction Ransomware is a form of malware that holds a victims data at ransom. The data is then encrypted so it cann . . . Read more
What is Wastedlocker? WastedLocker is a new ransomware operated by a Russian malware exploitation group commonly known as the Evil Corp. The attacks p . . . Read more
Description Cybercriminals are exploiting an email forwarding vulnerability on webmail platforms to make BEC (Business Email Compromise) attacks more . . . Read more
Microsoft is urging users to avoid using SMS and voice based multi-factor authentication (MFA) solutions and instead replace them with newer multi-fac . . . Read more
WhatsApp usage has increased tremendously in recent times, but unfortunately, so has cyber-crime and hacking. Cybercriminals are utilizing a social en . . . Read more
TikTok has quickly become a popular application in recent months, serving as a platform for viral videos, memes, and even political satire and activis . . . Read more
Todays advanced mobile devices are well integrated with the internet and have far more functionality than mobile phones of the past. The smart phones . . . Read more