Phishing
What is a Whale Phishing Scam and how to defend against such Cyber Threats
A whale phishing scam—often called “whaling”—is a highly targeted form of cyberattack aimed at senior executives or other high-value individuals within an organization. Unlike traditional phishing, which casts a wide net using generic emails, whaling focuses on “big fish” such as CEOs, CFOs, or senior government officials. The goal is usually to trick them into […]
Phishing Email on iCloud data storage exhaustion is a scam and fake
Over the past few days, many people living in metro and cosmopolitan cities have reported receiving suspicious emails warning them that their iCloud storage has reached its limit. At first glance, these messages appear legitimate and even direct recipients to what looks like an official support page. However, these emails are part of a carefully […]
Europol seizes Tycoon 2FA Phishing service infrastructure in coordinated operation
Europol, the European law enforcement agency dedicated to combating organized cybercrime, has recently achieved another significant milestone in its fight against online criminal networks. The agency successfully dismantled the IT infrastructure associated with Tycoon 2FA, a notorious phishing-as-a-service (PaaS) platform that had been operating since 2023. This takedown represents an important step in disrupting large-scale […]
Hackers are impersonating Avast to steal credit card data of users via Phishing
Cybercriminals are exploiting the name of Avast, a globally recognized anti-malware and cybersecurity provider, in a sophisticated phishing campaign designed to steal users’ credit card information. Although Avast itself has not been compromised, the incident has sparked concern and confusion, as attackers have created a highly convincing fake website that closely imitates the company’s official […]
Can YouTube videos spread Malware
With billions of daily views, YouTube is one of the most popular websites in the world. A common concern among users is whether simply watching a YouTube video can infect their device with malware. The short answer is: NO, watching a YouTube video itself does not spread malware. However, there are indirect risks users should […]
Lazarus hacking group infiltrates European Drone manufacturers to steal Intelligence
Lazarus Group, a notorious cybercrime organization believed to be backed by North Korea’s intelligence agencies, has reportedly launched a sustained cyber-espionage campaign targeting drone manufacturers across Europe. The group’s objective is to steal highly sensitive proprietary information related to unmanned aerial vehicle (UAV) technology, including drone designs, operational systems, and manufacturing processes. This stolen intelligence […]
Phishing Campaign leveraging Google Cloud targets Microsoft 365 credentials
A new phishing campaign has been uncovered in which cybercriminals are abusing Google Cloud services to steal Microsoft 365 login credentials, according to a recent study conducted by Check Point Software Technologies. The campaign highlights how attackers are increasingly exploiting trusted cloud platforms to bypass security controls and deceive users into handing over sensitive information. […]
QR Code Phishing Attacks surge in 2025, targeting Mobile Devices: A Growing Cybersecurity Threat
In 2025, Kaspersky, a renowned cybersecurity firm, uncovered an alarming rise in QR code-based phishing attacks. These attacks have gained significant traction, particularly targeting mobile devices. The report highlighted a dramatic spike in phishing emails involving QR codes, with a staggering five-fold increase in such incidents between August and November 2025. The primary factor behind […]
Corporate users more likely to be hit by Phishing Attacks than Malware
Corporate employees who are unaware of the potential risks are increasingly becoming targets of sophisticated cyber-attacks. These threats range from common forms like phishing, malware, and data breaches, to more advanced tactics such as Man-in-the-Middle (MITM) attacks, insider threats, SQL injections, brute force attacks, ransomware, and various exploits. A recent report by SpyCloud, a leading […]














