-
A sophisticated deepfake-enabled phishing campaign is actively targeting Bitcoin users through fake Zoom and Microsoft Teams calls. The attackers are exploiting video conferencing, Telegram, and AI-generated identities to steal bitcoin and compromise v…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new phishing campaign abusing the Vercel hosting platform has been active since at least November 2025 and is becoming increasingly sophisticated. The core trick is “inherited trust.” Attackers send short phishing emails with financial or business th…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
That LinkedIn message pretending to be job offer could just be malwre.
·
Cyber Attack, cybersecurity, DLL, Malware, PDF, Phishing, Python, RAT, ReliaQuest, SCAM, Security, TROJAN, vulnerability, WinRAR¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A sophisticated multi-stage phishing campaign is actively targeting PNB MetLife Insurance customers through fake payment gateway pages. The attack chain extracts customer details, forces fraudulent UPI payments, and escalates to full banking credential…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Resecurity has identified PDFSIDER malware that exploits the legitimate PDF24 App to covertly steal data and allow remote access. Learn how this APT-level campaign targets corporate networks through spear-phishing and encrypted communications.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers have found a new spying campaign using news about Venezuela to trick US government officials. Learn how the LOTUSLITE virus sneaks into computers to steal secrets.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Hackread.com exclusive: Scammers are using verified PayPal invoices to launch callback phishing attacks. Learn how the “Alexzander” invoice bypasses Google filters.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
New research has uncovered a sophisticated phishing campaign that abuses DocuSign’s brand to deliver Vidar malware and infect Windows systems. The operation uses a realistic phishing site, a fake signed installer, access…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Threat actors are continuing to refine “quishing” phishing delivered through QR codes by shifting from traditional image-based payloads to “imageless” QR codes rendered directly in email HTML, a tactic designed to sidestep security tools that focus on …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Phishing in 2026 is harder to detect and verify. Learn how CISOs can speed up investigations, reduce noise, and respond with confidence.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


