 
			
		Phishing via WhatsApp under the guise of online voting
We discovered a new wave of attacks on WhatsApp users in which attackers steal victims’ accounts using fake voting pages and social engineering on social networks.
900 articles
 
			
		We discovered a new wave of attacks on WhatsApp users in which attackers steal victims’ accounts using fake voting pages and social engineering on social networks.
 
			
		The Kaspersky for Android app can now detect malicious links in notifications from any app.
 
			
		Attackers spin poignant tales of lost private keys as they try to phish seed phrases.
 
			
		Don’t panic. Again, don’t panic. Did we say don’t panic? A common threat explained in simple terms.
 
			
		A curious case of spear-phishing email techniques employed on a mass scale.
 
			
		Scammers are exploiting GetShared to bypass email security.
 
			
		An Office 365 security alert as bait in a phishing email.
 
			
		Telegram bot sells subscriptions to phishing tools to hack Microsoft 365 accounts, including 2FA bypass.
 
			
		Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?
 
			
		Independent cybersecurity lab AV-Comparatives put 15 anti-phishing solutions to the test — with only eight making the grade. We took home the gold, adding to our already extensive collection of accolades.
 
			
		A turnkey home? A turnkey website? How about turnkey phishing? Scammers now sell turnkey phishing services to other scammers. Read on to find out how it works.
 
			
		Developers’ accounts are being hijacked using fake job offers sent from a legitimate GitHub address.
 
			
		A new phishing technique uses progressive web apps (PWAs) to mimic browser windows with convincing web addresses to steal passwords.
 
			
		Cybercriminals are using genuine Facebook infrastructure to send phishing emails threatening to block accounts.
 
			
		Cybercriminals prey on corporate credentials by sending phishing links through Dropbox after priming the victim.
 
			
		Cybercriminals prey on access to mailing tools by sending phishing emails through these same tools.
 
			
		Attackers invite employees to complete fake self-evaluations to steal corporate credentials.
 
			
		 
			
		Here’s how phishers extract phone numbers and credentials from users of Wise.
 
			
		We explain how phishers are swindling Wells Fargo customers out of personal credentials, passwords, card details, and selfies with an ID card.
 
			
		We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.