Reading Time: 3 minutesCybercriminals’ big hunt for users’ credentials is gaining momentum rapidly. Their strategy usually stays the same: get attention of the...
Reading Time: 4 minutesCybercriminal attacks on social media user accounts to gain access to user credentials are becoming more refined and sophisticated. Phishing...
Reading Time: 3 minutes
In a rather new trend, cybercriminals have begun to spread malware by spoofing printers and scanners.
These types of attacks started...
Reading Time: 5 minutesIn the first few weeks of 2018, cybercriminals targeted five universities, 23 private companies and several government organizations. Despite the...
Reading Time: 4 minutesComodo Threat Intelligence Lab discovered a new October phishing campaign with the infamous IKARUSdilapidated Locky ransomware payload, marking the 4th...
Reading Time: 5 minutesUPDATE AND CORRECTION: Konica Minolta C224e is not sending you dangerous phishing emails. Malicious hackers have created an email and file...
Reading Time: 2 minutesFollowing the Equifax data breach revelations, the Comodo Threat Intelligence Lab undertook a Dark Web analysis on the company and...
Reading Time: 3 minutesComodo Threat Research Labs (CTRL) has announced that it has detected a new family of financial malware dubbed as “Gugi/Fanta/Lime”....