Search Results for: advertisement Blog Post Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19... Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more... Blog Post What is Malvertising and How to Protect and Mitigate from it? July 7, 2020 In this cyber threats awareness post we will cover following topics: Malvertising vs Ad Malware How Malware inserted into ads?... Blog Post Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they... Blog Post Multiple Fraud Cases Registered in India January 13, 2020 On December 31st, the last of 2019, there were at least 9 fraud cases registered in India. Among these 9... Blog Post Russian Entrepreneurs Targeted by Instagram Phishing Scam February 25, 2020 Instagram users have now become the target of a new phishing campaign that uses login attempt warnings and content similar... Blog Post The Increasing Shortage of Cybersecurity Professionals June 4, 2020 In fact, the shortage of qualified cybersecurity employees is the biggest cyber risk. A report released by Cybersecurity Ventures in... Blog Post Twitter Hit With Identity Theft February 7, 2020 Recently, the Social Networking Site – Twitter was hit by a major privacy and security incident where one of its... Blog Post Types of Malware March 6, 2020 Malware is a potential term to define a malicious code written to perform mysterious actions on the target system. Malware... Blog Post Browser Extensions & Associated Vulnerabilities February 6, 2020 Web browser extensions are an effective way to manage and fix browser related functionalities. They are small software attached to... Blog Post Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by... Blog Post How to Shop Safely This Holiday Season – Tips from LIFARS, FBI, FTC December 19, 2019 Holidays is on its way! By the end of the year, the great discounts offered by a lot of shops... Blog Post Fake ‘KeePass’ Password Manager Site Found Distributing Adware May 10, 2019 A French site advertising itself as a KeePass Password manager was found spreading malware. The site is called, keepass{.}com is... Blog Post GoDaddy Takes Down 15,000 subdomains selling online scams April 26, 2019 GoDaddy took down 15,000 subdomains used in online scams. Online spam campaigns targeted users using fake celebrity endorsements to sell... Blog Post Hacker Selling Windows Zero-Days to Cyber Espionage Groups May 3, 2019 Malicious actors have been selling windows zero-days to advanced persistent threat (APT) groups and cybercrime gangs. The actor has sold...
Blog Post Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19...
Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more...
Blog Post What is Malvertising and How to Protect and Mitigate from it? July 7, 2020 In this cyber threats awareness post we will cover following topics: Malvertising vs Ad Malware How Malware inserted into ads?...
Blog Post Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they...
Blog Post Multiple Fraud Cases Registered in India January 13, 2020 On December 31st, the last of 2019, there were at least 9 fraud cases registered in India. Among these 9...
Blog Post Russian Entrepreneurs Targeted by Instagram Phishing Scam February 25, 2020 Instagram users have now become the target of a new phishing campaign that uses login attempt warnings and content similar...
Blog Post The Increasing Shortage of Cybersecurity Professionals June 4, 2020 In fact, the shortage of qualified cybersecurity employees is the biggest cyber risk. A report released by Cybersecurity Ventures in...
Blog Post Twitter Hit With Identity Theft February 7, 2020 Recently, the Social Networking Site – Twitter was hit by a major privacy and security incident where one of its...
Blog Post Types of Malware March 6, 2020 Malware is a potential term to define a malicious code written to perform mysterious actions on the target system. Malware...
Blog Post Browser Extensions & Associated Vulnerabilities February 6, 2020 Web browser extensions are an effective way to manage and fix browser related functionalities. They are small software attached to...
Blog Post Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by...
Blog Post How to Shop Safely This Holiday Season – Tips from LIFARS, FBI, FTC December 19, 2019 Holidays is on its way! By the end of the year, the great discounts offered by a lot of shops...
Blog Post Fake ‘KeePass’ Password Manager Site Found Distributing Adware May 10, 2019 A French site advertising itself as a KeePass Password manager was found spreading malware. The site is called, keepass{.}com is...
Blog Post GoDaddy Takes Down 15,000 subdomains selling online scams April 26, 2019 GoDaddy took down 15,000 subdomains used in online scams. Online spam campaigns targeted users using fake celebrity endorsements to sell...
Blog Post Hacker Selling Windows Zero-Days to Cyber Espionage Groups May 3, 2019 Malicious actors have been selling windows zero-days to advanced persistent threat (APT) groups and cybercrime gangs. The actor has sold...