Skip to content
InfosecToday.com
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com

Phishing Techniques 

  • orange bokeh photography
    Phishing Techniques  | Targeted Industries | Two-Factor Authentication Bypass 

    New phishing tool Salty2FA bypasses two-factor authentication

  • blue and white bokeh lights
    Cybersecurity Threats | Phishing Techniques  | State-Sponsored Hacking

    Amazon disrupts APT29 watering hole attack using Microsoft Device Code Authentication

  • a blurry photo of a city street at night
    Authentication Vulnerabilities | Cybersecurity Threats | Phishing Techniques 

    Hackers using specialized phishing tools for downgrade attacks on FIDO authentication

  • black computer keyboard on brown wooden desk
    Cybersecurity Threats | Malware Distribution Methods  | Phishing Techniques 

    Cybercriminals are exploiting SVG files by embedding harmful JavaScript to deploy malware on Windows systems.

  • black remote controller
    Cybercrime Operations | Digital Wallet Exploitation | Phishing Techniques 

    Chinese cybercriminals breached the security of as many as 115 million payment cards in the United States.

  • ai generated, data center, servers, hacker, internet, network, cybersecurity, cloud computing, software as a service
    Certificate Management | Phishing Techniques  | Security Risks

    How Poor Certificate Management Creates Vulnerabilities for Phishing and Man-in-the-Middle Attacks

  • ai generated, computer, hacker, internet, safety, network, cyber security, protect, data security, cyber security, cyber security, cyber security, cyber security, cyber security
    Financial Fraud  | Malware Campaign | Phishing Techniques 

    A new Android malware is disguising itself as SBI Card and Axis Bank applications to extract users’ financial information.

© 2026 InfosecToday.com - WordPress Theme by Kadence WP

How cybersecure is your business? Take our free quiz and find out
Cyber risk scorecard
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search