WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation

We reveal the inner workings of WOOF locker, the most sophisticated browser locker campaign we’ve seen to date. Learn how this tech support scam evades researchers and ensnares users by hiding in plain sight.

Read more

How to prevent a rootkit attack

Rootkit attacks are considered one of the most dangerous cyberthreats today. Learn what they are, how they infect systems, and how to protect against them.

Read more

6 ways hackers are targeting retail businesses

Whether it’s a high-volume shopping season or not, retail businesses are at risk from cybercriminals in a number of ways. Learn how hackers target retailers and shoppers alike.

Read more

Spelevo exploit kit debuts new social engineering trick

In order to maximize infection rate, threat actors are now launching the Spelevo exploit kit with a decoy adult site, social engineering users into downloading a malicious video player.

Read more

Fake Elder Scrolls Online developers go phishing on PlayStation

We take a look at a pressure-filled phishing attempt sent to players of the Elder Scrolls Online video game.

Read more

Deepfakes and LinkedIn: malign interference campaigns

Don’t discount deepfakes just yet. We may not be fooled by phony Mark Zuckerberg anymore, but the discovery of a fake LinkedIn profile sporting a deepfake avatar shows how social engineering can deceive through the mundane.

Read more

Not us, YOU: vendor email compromise explained

Vendor email compromise (VEC) is a new cybersecurity term for a familiar practice, taken to the thousandth degree. Learn the similarities with business email compromise and how your organization can protect against them both.

Read more

Help prevent disaster donation scams from causing more misery

Scammers will stop at nothing—not even a tragic natural disaster—for a chance to cash in. We offer some helpful tips to avoid disaster donation scams.

Read more

How to protect yourself from doxing

Doxing, or collecting and spreading private information about a user online, is a form of cyber harassment, stalking, and even a potential threat to physical safety. Here’s what you can do to protect yourself against it.

Read more

Instagram clamps down on fake messages with anti-phishing tool

We take a look at a new anti-phishing feature Instagram hopes will cut down on imitation messages and other social engineering attempts.

Read more

Select your language