Microsoft Seizes 338 Nigerian-Linked Websites Running Raccoon0365 Phishing Network
The operation, led by Nigeria-based developer Joshua Ogundipe, relied on Telegram to sell phishing kits to more than 850 subscribers.
The operation, led by Nigeria-based developer Joshua Ogundipe, relied on Telegram to sell phishing kits to more than 850 subscribers.
Email is still the easiest entry point for attackers. Traditional filters struggle against AI-powered phishing campaigns, which are more convincing ...
The data they accessed included business names, contact details, and CRM notes, but no Gmail passwords, emails, or private content.
The company disclosed these findings in its August 2025 Threat Intelligence Report, raising fresh alarms over the fast-growing misuse of ...
Phishing, vishing, and smishing attacks have increased significantly, leveraging advanced technologies and personalised tactics to deceive individuals and organisations. These ...
Dr. Bayero Agabi, the president of the Centre for Cyber Awareness and Development (CECAD), has passionately called for a heightened ...
Between 2019 and July 2023, banking customers lost N50.5 billion to banking-related fraud, a situation that soared as a result ...
Writer: Scott Sayce, the Global Head of Cyber Insurance at Allianz Commercial Ransomware attacks saw a sharp increase once again ...
Dr. Bosun Tijani, the minister of Communications, Innovation and Digital Economy, is set to join forces with Ethnos and OneIdentity/Quest ...
The Independent Advisor has just launched a new Company Data Breach Tracker for 2023. A regularly updated, month by month timeline ...
In this attack brief, Check Point Harmony Email researchers will discuss how hackers are using AWS to send out phishing ...
“We are very likely to experience the weaponization of manipulated information to influence people's perceptions and behaviours in relation to ...
Check Point Research (CPR) used ChatGPT to create malicious phishing emails and code, in order to warn of the potential ...
Fraudsters launched phishing attacks on universities to steal private research and student information
A common technique is HTML attachments with partially or fully obfuscated code. HTML files allow attackers to use scripts, obfuscate ...
© 2025 TECHECONOMY.