AI-Driven Phishing Attacks are rapidly becoming one of the most dangerous cyber threats facing enterprises and … AI-Driven Phishing Attacks: Detection and Defense StrategiesRead more
cybersecurity threats
Promptware Attack: Hackers Can Use Google Calendar to Spy via Zoom
Imagine this: you check your Google Calendar, and a seemingly harmless meeting invite appears. You ask … Promptware Attack: Hackers Can Use Google Calendar to Spy via ZoomRead more
Google Disrupts Massive Residential Proxy Networks Abusing User Devices
Residential proxy networks have quietly become one of the most abused infrastructures in modern cybercrime—and most … Google Disrupts Massive Residential Proxy Networks Abusing User DevicesRead more
Insider Threat Recruitment: How Cybercriminals Turn Employees Into Attack Vectors
In 2024, cybercrime tactics took a dangerous turn: instead of breaking in, attackers started logging in. … Insider Threat Recruitment: How Cybercriminals Turn Employees Into Attack VectorsRead more
15 Zero-Days Used to Hack Phones in Intellexa Campaign
A commercial spyware vendor known as Intellexa has been linked to at least 15 zero-day vulnerabilities … 15 Zero-Days Used to Hack Phones in Intellexa CampaignRead more
Browser-in-the-Browser (BitB) Attacks: The New Phishing Frontier
Cybercriminals are constantly innovating, and one of the most alarming phishing techniques gaining traction is the … Browser-in-the-Browser (BitB) Attacks: The New Phishing FrontierRead more
Handala Escalates Cyber Targeting of Israeli Tech & Aerospace Workers
A recent escalation in hostile cyber activity has raised alarms across the cybersecurity community. A hacker … Handala Escalates Cyber Targeting of Israeli Tech & Aerospace WorkersRead more
New Wave of Formbook Malware Attacks Uses Weaponized ZIP Files
Cybersecurity researchers have uncovered a new Formbook malware campaign that uses weaponized ZIP archives, multi-layered scripts, … New Wave of Formbook Malware Attacks Uses Weaponized ZIP FilesRead more