Search Results for: Phishing Scams Blog Post How to Identify Phishing Emails: Follow Your Instincts November 26, 2021 We all know that phishing emails are fake emails that we need to identify to thwart their consequences. In the... Blog Post Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... Blog Post Government ID Database Hack for the Entire Population of Argentina January 3, 2022 Allegedly, cybercriminals managed to hack the government ID database of the entire population of Argentina in September 2021. According to... Blog Post Russian Entrepreneurs Targeted by Instagram Phishing Scam February 25, 2020 Instagram users have now become the target of a new phishing campaign that uses login attempt warnings and content similar... Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Blog Post New CITI Bank Phishing Scam Tricking Users January 29, 2020 An advanced level of CITI bank phishing attack has emerged on the web. This attack utilizes the use of OTP... Blog Post COVID-19 Alert: Coronavirus Email Phishing Scams are on the Rise March 26, 2020 We are observing a growing number of phishing attacks where the attackers are exploiting the COVID-19 situation to give their... Blog Post Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in... Blog Post Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services... Blog Post Advanced Persistent Threat (APT) Lazarus’ Latest Campaigns July 20, 2020 What is the first thing that comes to your mind when asked what techniques does North Korea use to threaten... Knowledge Center PHISHING INFRASTRUCTURE May 12, 2021 Phishing Capabilities Demonstration The goal of this whitepaper is to summarize technical details of a phishing infrastructure we developed and... Blog Post Unemployment Scams During the Outbreak of COVID-19 April 22, 2020 Japan has just declared a state of emergency across the country, and the number of unemployed in the United States... Blog Post Cyber Security Risks Related to the Novel Coronavirus – COVID 19 March 11, 2020 We in LIFARS are carefully following the latest developments in the cyber security realm. Thus, we are not surprised, that... Blog Post REvil Ransomware Kaseya Supply-Chain Attack Summary July 12, 2021 REvil Ransomware Kaseya: Ransomware attacks on Colonial Pipeline, JBS Foods, Kaseya and other major organizations are in the headlines, and... Blog Post Analysis of TrickBot Malware – the most prolific COVID-19 themed malware July 23, 2020 In this article you will learn about: Distribution techniques of TrickBot malware Different modules and tasks of the TrickBot payload ...
Blog Post How to Identify Phishing Emails: Follow Your Instincts November 26, 2021 We all know that phishing emails are fake emails that we need to identify to thwart their consequences. In the...
Blog Post Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the...
Blog Post Government ID Database Hack for the Entire Population of Argentina January 3, 2022 Allegedly, cybercriminals managed to hack the government ID database of the entire population of Argentina in September 2021. According to...
Blog Post Russian Entrepreneurs Targeted by Instagram Phishing Scam February 25, 2020 Instagram users have now become the target of a new phishing campaign that uses login attempt warnings and content similar...
Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Blog Post New CITI Bank Phishing Scam Tricking Users January 29, 2020 An advanced level of CITI bank phishing attack has emerged on the web. This attack utilizes the use of OTP...
Blog Post COVID-19 Alert: Coronavirus Email Phishing Scams are on the Rise March 26, 2020 We are observing a growing number of phishing attacks where the attackers are exploiting the COVID-19 situation to give their...
Blog Post Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in...
Blog Post Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services...
Blog Post Advanced Persistent Threat (APT) Lazarus’ Latest Campaigns July 20, 2020 What is the first thing that comes to your mind when asked what techniques does North Korea use to threaten...
Knowledge Center PHISHING INFRASTRUCTURE May 12, 2021 Phishing Capabilities Demonstration The goal of this whitepaper is to summarize technical details of a phishing infrastructure we developed and...
Blog Post Unemployment Scams During the Outbreak of COVID-19 April 22, 2020 Japan has just declared a state of emergency across the country, and the number of unemployed in the United States...
Blog Post Cyber Security Risks Related to the Novel Coronavirus – COVID 19 March 11, 2020 We in LIFARS are carefully following the latest developments in the cyber security realm. Thus, we are not surprised, that...
Blog Post REvil Ransomware Kaseya Supply-Chain Attack Summary July 12, 2021 REvil Ransomware Kaseya: Ransomware attacks on Colonial Pipeline, JBS Foods, Kaseya and other major organizations are in the headlines, and...
Blog Post Analysis of TrickBot Malware – the most prolific COVID-19 themed malware July 23, 2020 In this article you will learn about: Distribution techniques of TrickBot malware Different modules and tasks of the TrickBot payload ...