Kaspersky has unearthed a phishing campaign targeting cryptocurrency users across the globe. The scheme showcases the ever-evolving tactics used by cybercriminals, reflecting cryptocurrency’s increasing appeal. During the spring of 2023 alone, Kaspersky’s solutions detected and thwarted over 85,000 scam emails, encompassing both hot and cold wallets. Kaspersky provides an in-depthRead More…

Kaspersky’s anti-phishing systems have prevented 5 million cryptocurrency-related phishing attacks in 2022, increasing by 40 percent compared to the previous year. Conversely, there was a decrease in the detection of traditional financial threats, such as banking and mobile financial malware. These and other findings can be found in company’s latestRead More…

Yahoo climbed 23 places in Q4 2022 according to Check Point Research Check Point Research (CPR) has published its Brand Phishing Report for Q4 2022. The report highlights the brands that were most frequently imitated by cybercriminals in their attempts to steal individuals’ personal information or payment credentials during October,Read More…

Check Point Research (CPR) has published its Brand Phishing Report for Q3 2022. The report highlights the brands which were most frequently imitated by criminals in their attempts to steal individuals’ personal information or payment credentials during July, August and September. While LinkedIn was the most imitated brand in bothRead More…

Kaspersky (www.Kaspersky.co.za) analysis has revealed that attacks related to data loss threats (phishing and scams/social engineering) increased significantly in Africa in Q2 2022 in comparison with the previous quarter. The company’s security solutions detected 10,722,886 phishing attacks in Africa in Q2. Kenyan users were influenced the most by this typeRead More…

Infoblox today unveils a global report examining the state of security concerns, costs, and remedies. As the pandemic and uneven shutdowns stretch into a third year, organisations are accelerating digital transformation projects to support remote work. Meanwhile, attackers have seized on vulnerabilities in these environments, creating more work and largerRead More…