Phishing Techniques | Targeted Industries | Two-Factor Authentication Bypass New phishing tool Salty2FA bypasses two-factor authentication
Cybersecurity Threats | Phishing Techniques | State-Sponsored Hacking Amazon disrupts APT29 watering hole attack using Microsoft Device Code Authentication
Authentication Vulnerabilities | Cybersecurity Threats | Phishing Techniques Hackers using specialized phishing tools for downgrade attacks on FIDO authentication
Cybersecurity Threats | Malware Distribution Methods | Phishing Techniques Cybercriminals are exploiting SVG files by embedding harmful JavaScript to deploy malware on Windows systems.
Cybercrime Operations | Digital Wallet Exploitation | Phishing Techniques Chinese cybercriminals breached the security of as many as 115 million payment cards in the United States.
Certificate Management | Phishing Techniques | Security Risks How Poor Certificate Management Creates Vulnerabilities for Phishing and Man-in-the-Middle Attacks
Financial Fraud | Malware Campaign | Phishing Techniques A new Android malware is disguising itself as SBI Card and Axis Bank applications to extract users’ financial information.