phishing

In its most recent edition, Operation First Light 2022, planned by Interpol, led to the identification of various social engineering groups around the world, in addition to the seizure ofRead More →

A worrying number of cybercriminal campaigns occur with no indication of those responsible for these online crimes, especially those with financial motivations. However, in some cases, threat actors leave enoughRead More →

Threat actors could exploit a critical zero-day vulnerability in Windows Search to run remotely hosted malware just by automatically opening a search window with a Word document. According to theRead More →

Researchers at security firm Fortinet report detecting a fraudulent campaign based on the delivery of three pieces of fileless malware with enhanced confidential information-stealing capabilities. The malware is delivered throughRead More →