London Blue Cybergang List 50000 execs for Phishing Attacks

London Blue Cybergang List 50,000 execs for Phishing Attacks

As reported by SC Magazine, a U.K./Nigerian cybergang has accumulated a list of more than 50,000 corporate executives to be targeted in future phishing campaigns. According to Agari’s London Blue…

Read More
New Pterodo Backdoor Malware Detected By Ukraine

New Pterodo Backdoor Malware Detected By Ukraine

The Computer Emergency Response Team of Ukraine (CERT-UA) and the Foreign Intelligence Service of Ukraine detected a new malware Pterodo Windows backdoor that was targeting computers at Ukrainian government agencies….

Read More
Open EDR
Cybercriminals Using SMS Phishing Attack to Rob Cardless ATM

Cybercriminals Using SMS Phishing Attack to Rob Cardless ATM

Cybercriminals have devised a new way of hacking cardless ATMs using SMS-based phishing attacks. It has become a new trend with many financial institutions to offer cardless ATM transactions, thereby…

Read More
Private Health Still Australia’s Most Breached Sector

Private Health Still Australia’s Most Breached Sector

Private health still continues to retain its position as Australia’s most breached sector as phishing attacks register an increasing trend, as per the latest reports. The Office of the Australian…

Read More
Apple Made Apology Due to Apple ID Phishing Attacks

Apple Made Apology Due to Apple ID Phishing Attacks

Just a few weeks after Facebook and Google faced controversial embarrassment when it comes to their security, seems like it is Apple’s turn for their own version of a security…

Read More
On Phishing Attacks and the Companies That are Targeted the Most

On Phishing Attacks and the Companies That are Targeted the Most

We at HackerCombat have always been writing about different kinds of phishing attacks and also on how phishing scams are on the rise. The last phishing-related story we had done…

Read More
Device Security Discussing Two Important Security Threats

Device Security: Discussing Two Important Security Threats

We are living in the age of advanced digital technology. All kinds of individual and digital devices are now part of our day-to-day lives. The possibilities that these devices bestow…

Read More
Counter Phishing Attacks with These Five Tricks

Counter Phishing Attacks with These Five Tricks

Forgot to lock your office, never mind you have a much bigger security concern to worry about, for example, phishing attacks. In 2017 nearly 76 percent of the business across…

Read More
Russian Hackers Reportedly Use Kaspersky Software to Steal U.S Cyber Secrets from NSA 1

More Russian Hacking in Waiting

This is the era of fake news and misinformation, so how can election hacking be left out. Remember the file picture of a silhouette man walking away past the Microsoft logo in…

Read More
Wombat Securitys

Discussing Wombat Security’s Fourth Annual State of the Phish™ Report

It was rather recently that Wombat Security Technologies, the leading provider of cyber security awareness and training, released its fourth annual State of the Phish™ report. Released in mid-January, the…

Read More

Page 3 of 4

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register