• Genel

    4 REASONS BEHIND SMS ATTACKS

    Do you think nobody uses SMS these days? Many people feel that SMS is a thing of the past and ignore the dangers of communicating via SMS. But hackers are aware of this and are ready to exploit people’s weaknesses. Considering recent attacks, SMS attacks are still a popular method used by hackers for phishing….

  • Genel

    THE LATEST CRYPTOCURRENCY ATTACKS BY RUSSIAN HACKERS

    Authorities recently announced the sentence of two Russian hackers for crimes they committed. In the past years, criminals who have stolen many users’ identity and earned close to $ 17 million in cryptocurrencies were also accused of hacking several websites directly interested in cryptocurrencies. Here’s how the latest cryptocurrency attack by Russian hackers happened. It…

  • Genel

    VIRUS-THEMED FAKE EMAILS ARE ON THE RISE

    Nowadays, the most common method used by criminals in attacks is to capture users’ personal information. While these attacks cause some companies to have a hard time during the pandemic period, the attackers are experiencing their most successful periods. It is said that there is a large increase in the number of cybercriminal groups in…

  • Genel

    INCREASE IN AMAZON PHISHING ATTACKS BEFORE THE SALE SEASON

    Phishing attacks against the successful company Amazon are increasing just before the sale season arrives. Here’s the reason behind the increase in Amazon phishing attacks before the sale season! What caused the increase in Amazon phishing attacks before the sale season? Amazon is a fast-growing company that is breaking sales records. Due to the increasing…

  • Genel

    ROYAL RIPPER MULTI-STAGE PHISHING ATTACKS

    Recently, an attack called ‘Royal Ripper Multi-Stage Phishing Attack’ targeting financial institutions and their customers by acting as a government agency or telecom has been on the agenda. The attack is named after the hacker called Royal Ripper, who is responsible for the attack. The hacker starts by capturing the personal information and bank code…

  • Genel

    PHISHING ATTACKS USING LOCAL FILES

    Phishing attacks are the primary concern of many individuals and organizations. To avoid the consequences of these attacks, people take precautions considering the characteristics of the regular phishing attacks. But now, there is a new method that is popular among hackers called. These are phishing attacks using local files. The phishing attacks using local files…

  • Genel

    APPROACH TO COMPLETELY SOLVE PHISHING ATTACKS

    Phishing attacks today are the biggest threat to organizations. That’s why IT administrators and managed service providers (MSPs) must use the best anti-phishing software on the market to protect their organizations. In this piece, we offer you a new approach to completely solve phishing attacks. Before we learn about this new approach to completely solve…

  • Genel

    WORM PHISHING ATTACKS CHANGE THE SCOPE OF CYBER ATTACKS

    A phishing attack against a corporation has uncovered a sneaky way of attacking multiple victims. Recently, a method called worm phishing changes the scope of cyber attacks. That’s why multi-factor authentication is essential for corporations. How did worm phishing change the scope of cyber attacks? The first sign of worm phishing changing the scope of…

RSS Teknoloji Haberleri