News

Organizations must take steps to protect themselves and the communities they serve, and consumers must be aware of the threat ...
Malicious interference with the United States Global Positioning System (GPS) is a potentially fatal safety hazard that ...
Discover how the Morphing Meerkat phishing kit powers phishing-as-a-service (PhaaS) attacks, evades detection, and how you can detect and stop it.
Cofense Intelligence detected a new technique for successfully delivering a credential phishing page to a user’s inbox: blob URIs (Uniform Resource Identifier).
Hackers are using stolen email accounts to launch phishing attacks ... and some may have even begun incorporating examples into their security awareness training. That being said, it’s highly ...
With the REAL ID enforcement deadline approaching on May 7, 2025, a surge in online scams is targeting individuals seeking ...
As millions of Americans race to get their REAL IDs, we have a warning about scams that are on the rise. According to ...
Letters to the editor address ways Kansas can strengthen scam protections and an 1822 letter that is relevant today.
Phishing attacks are evolving. Gone are the days of clumsy, error-ridden emails that were easy to spot – today’s campaigns ...
You might just use social media for watching funny cat videos, but crooks use it to steal your money and information. Here, fraud experts show you how to avoid becoming a victim of a Facebook scam.
The phishing campaign started in January 2025 and begins with an email spoofing a Ministry of Foreign ... strings from an unpacked WINELOADER sample," explain the researchers.