مدونة
أهلا بك، نحن
ذا سايبر واتشرز
اشترك في النشرة الإخبارية لمعرفة المزيد عن القمة
نقاط الضعف والهجمات في جميع أنحاء العالم.
نقاط الضعف والهجمات في جميع أنحاء العالم.
عفوًا! حدث خطأ ما أثناء إرسال النموذج.
جميع المقالات
شكرًا لك! تم استلام طلبك!
عفوًا! حدث خطأ ما أثناء إرسال النموذج.

January 30, 2025
Signed, Sealed, and Scammed: Cybercriminals Exploit DocuSign API for Fraudulent Invoices
phishing
SocialEngineering
Securityawareness
CyberDefence

January 30, 2025
Transparent Tribe Strikes Again: The Rise of ElizaRAT and its Sneaky Cloud-Based Sidekick, ApoloStealer
Malware
Databreach
data protection
Cyberattacks
SecurityTraining

January 30, 2025
SolarSys Trojan
Trojan
Malware
phishing
data breaches
Dataprotection

January 30, 2025
When Security Enhancements Meet the Infostealer's Toolbox
Dataencryption
CyberAwareness
Malware
Infostealers
Ransomware

January 30, 2025
Fake IT Help Desks on Microsoft Teams: Black Basta’s New Ransomware Tactic"
Ransomware
phishing
CyberThreat
Employeetraining

January 30, 2025
Understanding Beast Ransomware: A Growing Threat
Systemscan
Ransomware
Employeetraining
threatdetection
incidentresponse

January 30, 2025
Deceptive Fix: The Google Meet Scam Targeting Your Trust
threatdetection
Malware
phishing
Endpointprotection

January 30, 2025
A Ticking Time Bomb
CyberAwareness
Riskassessments
Endpointprotection
Business continuity plan
Dataprivacy

January 30, 2025
The Evolution of QR Code Phishing—And Why You Could Be the Next Target
Quishing
EmailSafety
CyberAwareness
SecurityTraining

January 30, 2025
When Your Inbox Rings: The Rise of Callback Phishing (TOAD Attacks)
phishing
EmailSafety
CyberAwareness
Malware
Online Safety

January 30, 2025
FASTCash Strikes Again—This Time, Linux is the Target!
Dataprotection
Malware
Cybercriminals
SecurityTraining

January 30, 2025
The Rise of Mamba 2FA – A New Threat in Phishing Attacks
threatdetection
MFA
phishing
SecurityTraining
عذرًا، لم نتمكن من العثور على أي نتائج. جرب بحثًا آخر.