Articles by Tag #phishing

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

$100K+ Returned — Wallet Access Restored (Adverting Case)

A polished “ad deal” led to a wallet compromise. Funds had already moved. We restored access and...

Learn More 79 0Aug 31

PhishDestroy: A Direct War on Phishing Operations

We are PhishDestroy, a global volunteer community engaged in a direct war on cybercrime. Since our...

Learn More 75 0Aug 31

Cybersecurity Weekly #9: AI-Powered Phishing Inside Collaboration Tools

Why It’s a Growing Threat Attackers are increasingly using AI-generated phishing messages...

Learn More 2 0Nov 21

Phishing: The Complete Guide to Cyber Deception and Protection

Phishing: the art of convincing you to hand over your keys while you hold the door open for the...

Learn More 0 0Aug 31

How One Phishing Email Just Compromised 2.6 Billion NPM Downloads (And Why Every Dev Should Care)

"Hi, yep I got pwned. Sorry everyone, very embarrassing." That's how Josh Junon (maintainer handle:...

Learn More 22 0Sep 10

Phishing And Malware - A Practical Dive

"It’s not what happens to you, but how you respond that matters". - Epictetus Picture this: you’re...

Learn More 5 0Dec 2 '24

Get Phished by a Public AWS Systems Manager Automation Document

[Update 2025-01-09] Thanks Wiz.io for featuring this as a new phishing technique! ...

Learn More 11 0Dec 22 '24

🚨 “Google Alert: Someone Just Logged In?” — Don’t Fall for the Phishing Trap

title: "How a Fake Email Can Fool Anyone — And How You Can Stay One Step Ahead" 🛡️ "Cybersecurity...

Learn More 2 0Jul 9

Understanding Spear Phishing: How to Protect Yourself from Targeted Cyber Attacks

Spear phishing is a highly targeted form of cyber attack designed to deceive individuals into...

Learn More 0 0Apr 28

The Rise of AI-Generated Phishing Websites: How Hackers Are Weaponizing Generative Tools

In recent years, phishing has transformed from simple deceptive emails into sophisticated, AI-powered...

Learn More 0 0Jul 4

How to protect yourself against cyber threats

Cybersecurity has become an essential part of our daily lives, especially with the rise of online...

Learn More 0 0Feb 8

Meow Ransomware: When Cats Aren’t as Cute as They Seem

Created by @hacknip If you thought cats were the rulers of the Internet, wait until you meet Meow,...

Learn More 1 0Dec 5 '24

How to Prevent Phishing Attacks: A Technical Implementation Guide

Last week, our CISO got phished. Yes, really. The email was so convincing that three senior managers...

Learn More 0 0Jun 20

Understanding Phishing Attacks: How to Recognize, Avoid, and Respond to Phishing Scams

Phishing attacks are a type of cybercrime where attackers trick individuals into revealing sensitive...

Learn More 0 0Apr 29

Watch Out for These Slash-Like Unicode Characters in Phishing Links

Phishing attacks are getting sneakier, and sometimes all it takes is a single Unicode character...

Learn More 0 0Aug 20

How to Protect Yourself From Malicious Links: A Complete Guide

Always verify links before clicking Introduction In today's digital world, malicious...

Learn More 2 0Jul 27

🛑 Don’t Scan That Code: The Rise of QR Code Phishing Scams

“Everything looks safe… until it isn’t. The probable scam might be hiding in plain sight —...

Learn More 3 0Jul 16

The Evolution of Email Threats: From Spam to Advanced Phishing

"The Evolution of Email Threats: From Spam to Advanced Phishing" delves into the significant...

Learn More 0 1Jun 13

AI-Powered Phishing Attacks: Can AI Fool Even Cybersecurity Experts?

Cyber threats are evolving fast, and artificial intelligence (AI) is now playing a major role in...

Learn More 0 0May 6

What Is Phishing? Real-Life Examples and Protection Tips

Phishing is one of the oldest tricks in the hacker’s book, but it still works like a charm. Why?...

Learn More 0 0Jun 1

A Guide to Phishing Websites and Malicious Link Checkers

1. What Are Phishing Websites? Phishing websites impersonate legitimate platforms—like...

Learn More 0 0Jun 14

How AI Is Changing the Game in Phishing Attacks

By Dr. Feliks Kravets A Dark Turn in Cyber Deception Phishing attacks have become more...

Learn More 1 0Aug 13

Social Engineering and Human-Centric Security Attacks

# Social Engineering and Human-Centric Security Attacks ## Introduction Social engineering remains one of the most effective attack vectors, exploit...

Learn More 1 0Aug 11

Advanced Phishing Detection Techniques: Staying Ahead of Cybercriminals

Phishing attacks are a growing cybersecurity threat, constantly evolving in sophistication. To stay...

Learn More 0 1Jun 17

Phishing Training for End Users

Businesses are among the main targets of cyberattacks, yet not all companies provide phishing-related...

Learn More 1 0Aug 13

Building a Custom Instagram-Style Login with Flask and MySQL

In today’s digital world, user authentication is a fundamental feature in any web application....

Learn More 0 0Mar 23

How to Install and Use AnonPhisher in Termux

Phishing is a common online threat where attackers pretend to be real websites to trick people into...

Learn More 0 0Apr 17

🕵️‍♂️ Exploring Evilginx2 — and Tweaking It to Phish Microsoft Like a Boss

Lately, I’ve been diving into some red-team tooling just to get a better grasp of how modern phishing...

Learn More 0 0Jun 5

How U.S. Freelancers and Small Businesses Can Spot AI-Generated Phishing Emails in 2025

AI-generated phishing emails in 2025 are now a serious threat to U.S. freelancers and small business...

Learn More 0 0Aug 25

What is Phishing-Resistant MFA?

Phishing-resistant MFA offers stronger protection by using advanced tools like FIDO2/WebAuthn or...

Learn More 1 0May 14