PhishingSecurity Notable email phishing techniques in 2025 by admin October 21, 2025 by admin October 21, 2025 Introduction Cyberthreats are constantly evolving, and email phishing is no exception. Threat actors keep… 0 FacebookTwitterPinterestEmail
PhishingSecurity Cyberespionage campaign PassiveNeuron targets machines running Windows Server by admin October 21, 2025 by admin October 21, 2025 Introduction Back in 2024, we gave a brief description of a complex cyberespionage campaign… 0 FacebookTwitterPinterestEmail
PhishingSecurity Malicious package with AdaptixC2 framework agent found in npm registry by admin October 17, 2025 by admin October 17, 2025 Incident description The first version of the AdaptixC2 post-exploitation framework, which can be considered… 0 FacebookTwitterPinterestEmail
PhishingSecurity Hidden links: why your website traffic is declining by admin October 17, 2025 by admin October 17, 2025 When analyzing the content of websites in an attempt to determine what category it… 0 FacebookTwitterPinterestEmail
PhishingSecurity Maverick: a new banking trojan abusing WhatsApp in a massive scale distribution by admin October 15, 2025 by admin October 15, 2025 A malware campaign was recently detected in Brazil, distributing a malicious LNK file using… 0 FacebookTwitterPinterestEmail
PhishingSecurity Mysterious Elephant APT: TTPs and tools by admin October 15, 2025 by admin October 15, 2025 Introduction Mysterious Elephant is a highly active advanced persistent threat (APT) group that we… 0 FacebookTwitterPinterestEmail
PhishingSecurity Hacktivism in 2025: what it looks like and how hashtags help analyze it by admin October 14, 2025 by admin October 14, 2025 What do hacktivist campaigns look like in 2025? To answer this question, we analyzed… 0 FacebookTwitterPinterestEmail
PhishingSecurity Neil Lawrence: What makes us unique in the age of AI by admin October 7, 2025 by admin October 7, 2025 As AI advances at a rapid clip, reshaping industries, automating tasks, and redefining what… 0 FacebookTwitterPinterestEmail
PhishingSecurity Desktop and IoT threat report for Q2 2025 by admin October 7, 2025 by admin October 7, 2025 IT threat evolution in Q2 2025. Non-mobile statisticsIT threat evolution in Q2 2025. Mobile… 0 FacebookTwitterPinterestEmail
PhishingSecurity Don’t let cybercriminals steal your Spotify account by admin October 7, 2025 by admin October 7, 2025 Spotify boasts almost 700 million active users, including 265 million premium subscribers. As the… 0 FacebookTwitterPinterestEmail