That Unpaid Toll Text Message Can Render Your Bank Empty!

That Unpaid Toll Text Message Can Render Your Bank Empty!

  emailsecurity · That Unpaid Toll Text Message Can Render Your Bank Empty!   Commuting from one place to another isn’t just time-consuming but can also feel heavy on your pocket. No, this is not about the rising prices of gasoline. In a serious turn of events, a new and alarming type of smishing incident

View Full Post
Newbie CoralRaider Targets Asian Brands To Extract Social Media Data

Newbie CoralRaider Targets Asian Brands To Extract Social Media Data

  There’s a new kid named CoralRaider in the block of Vietnamese cyber criminals. These cyber attackers have targeted Asian organizations and brands with the aim of gaining access to social media account details and sensitive user data. The specialty of CoralRaider lies in seamless data extraction through legitimate services and social engineering tactics. 

Seoul Witnesses a Coalition Against Increasing Phishing Actors!

Seoul Witnesses a Coalition Against Increasing Phishing Actors!

  emailsecurity · Seoul Witnesses a Coalition Against Increasing Phishing Actors!   Phishing scams have become commonplace and have intruded into our everyday lives in ways beyond our imagination. Commoners, as well as A-listers across the globe, have fallen prey to phishing scams.

Okta Phishing Attack Facilitated By CryptoChameleon!

Okta Phishing Attack Facilitated By CryptoChameleon!

  Hacking instances are rampant across the globe, and this time, the target is none other than the Federal Communications Commission or FCC. There’s a new kid on the block named CryptoChameleon, and this brand-new phishing kit is being used to attack the FCC employees. Basically, the threat actors are using CryptoChameleon to come up

View Full Post
Data-Driven Insights that Improve Digital Security

Data-Driven Insights that Improve Digital Security

You can’t prevent a threat you don’t understand, but how do you understand these cyber threats? The answer is simple: you gather as much data as possible from previous instances, analyze them, and use sophisticated analytical tools to turn this data into insights. Here’s how all of this works and how you can use it

View Full Post