NDSS 2025 – Qualitative Study On Boards’ Cybersecurity Risk Decision Making
SESSIONSession 2C: Phishing & Fraud 1 Authors, Creators & Presenters: Jens Christian Opdenbusch (Ruhr University Bochum), Jonas Hielscher (Ruhr...
SESSIONSession 2C: Phishing & Fraud 1 Authors, Creators & Presenters: Jens Christian Opdenbusch (Ruhr University Bochum), Jonas Hielscher (Ruhr...
SESSIONSession 2C: Phishing & Fraud 1 Authors, Creators & Presenters: Marzieh Bitaab (Arizona State University), Alireza Karimi (Arizona State...
Those who follow the DNS abuse landscape closely may have noticed a rise in activity and abuse reports related...
On paper, it sounds so simple: you prepare for the real thing by running simulations. After all, the same principle...
In September 2022, Coyote emerged in Latin America through phishing campaigns, cleverly masking malicious ZIP archives as resume submissions. The...
From false PDFs to false customer support calls and malicious advertisements, phishing scams use urgency and trust to pilfer...
How Monmouth Regional High School District’s Tech Team Improved Cybersecurity and Student Safety Using Cloud Monitor At Monmouth Regional...
When people think of cyber threats today, ransomware tends to dominate the conversation. It’s flashy, destructive, and grabs headlines. But...
Bureau Valley CUSD Protects Students and Data While Maximizing Budget and Efficiency Bureau Valley Community Unit School District (CUSD) in...
The scale of credential theft through phishing has reached alarming proportions. Recent analysis of the LabHost phishing operation reveals that...
Image: Mykyta/Adobe Stock Being confident is cool, but overconfidence is another matter. A new report reveals that despite continued confidence...
The threat of ransomware and data theft continues to evolve. Adversaries are increasingly exploiting unpatched network-edge devices, and credential theft...
Cybercrime ring GXC Team dismantled in Spain, 25-year-old leader detained Pierluigi Paganini October 11, 2025 Spain’s Guardia Civil dismantled the...
ClayRat campaign uses Telegram and phishing sites to distribute Android spyware Pierluigi Paganini October 09, 2025 ClayRat Android spyware targets...
A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this...