Phishing

Conditional QR Code Routing Attacks: Unveiling a New Frontier in Email Security Threats

As cyber threats continue to evolve, attackers are constantly finding ways to bypass traditional security measures.One emerging tactic that has caught the attention of cybersecurity experts is the use of…

Read more

Bybit Hack Exposed: Phishing Tactics and How to Prevent Similar Attacks

In recent months, the cryptocurrency world has been rocked by a high-profile hack at Bybit, a leading crypto exchange, that exploited phishing tactics to gain unauthorized access. This incident, as…

Read more

Fake Voicemail as a Credential Harvesting Lure: How Cyber Criminals Exploit Trust in Voicemail Notifications

In today’s ever-evolving threat landscape, attackers continue to find innovative ways to deceive users and harvest sensitive credentials. One particularly insidious method, recently detailed by Check Point Email Security, involves…

Read more

Navigating the Treacherous Waters of Phishing: The Rise of Robin Banks PhaaS

In the constantly evolving cyber threat landscape, a new contender has emerged, posing a significant risk to financial and cryptocurrency services. Dubbed Robin Banks, this Phishing as a Service (PhaaS)…

Read more
Phishing Attack Statistics

2023 Phishing Attack Statistics

In this post we will look at phishing attack statistics for 2023. Phishing attacks are quite a common way to attempt to compromise accounts and potentially infrastructures as well depending…

Read more
Eagle-Eye-T-Credit-Card-Details-Insta

Protecting your Credit Card Details

With various malicious threat actors continuously evolving their attack techniques it is becoming extremely important to keep our credit card details safe in our highly networked world. With how convenient…

Read more
Eagle-Eye-T-Banner-BEC-updated

What Is Business Email Compromise (BEC)

What is BEC (Business Email Compromise) Business Email Compromise, or BEC, is a type of cybercrime where scammers use email to trick the recipient to either send money or divulge…

Read more
Threat Advisory EvilExtractor Malware Spikes In Europe and US

Threat Advisory – EvilExtractor Malware Spikes In Europe and US

Distributed through phishing campaigns, EvilExtrator malware attacks have increased in both Europe and the US. This malware can harvest different types of data, including ones browser history, passwords, and cryptocurrency…

Read more

What is DMARC?

DMARC, or Domain Based Message Authentication, Reporting & Conformance, is a way to authenticate email messages originating from ones own domain. This improves deliverability, as well as increases domain reputation but…

Read more
5 warning signs of a phishing email

Signs To Watch Out For If You Suspect An Email To Be A Phishing Email

One of the many types of cyber crimes that are used by malicious threat actors is that of phishing. Phishing usually targets one or more individuals by email, telephone or…

Read more