A new phishing campaign has been identified, delivering the Phantom information-stealing malware via an ISO attachment ...
Researchers report phishing emails in Russia using ISO attachments to deploy Phantom Stealer against finance and related ...
Know how cybercriminals use LLMs to target crypto users. Learn about AI-generated phishing, fake smart contracts, and how to ...
Targeted email scams are getting bolder and more convincing. Here's how they work, and the smartest ways to defend yourself.
A crypto user lost $440,358 in USDC after approving a malicious permit signature, amid a surge in phishing attacks.
Abstract: Phishing has become an increasing concern and captured the attention of end-users as well as security experts. Existing phishing detection techniques still suffer from the deficiency in ...
Kaspersky reports 2025 cyberattacks surged across shopping, gaming and streaming platforms, with more than 6.3m phishing ...
Abstract: Phishing has become a serious and concerning problem within the past 10 years, with many reviews describing attack patterns and anticipating different method utilizations. This indicates ...
Add a description, image, and links to the discord-hacking topic page so that developers can more easily learn about it.
Know why NFT marketplaces are central to the digital collectibles economy. Learn about minting, marketplace types, and protecting against LLM-powered social engineering risks.
Tomiris is using public-service C2 implants and new phishing chains to stealthily deploy multi-language malware across targeted government networks.
Cybercriminals attempted more than six million shopping-related phishing attacks in 2025, according to new figures from Kaspersky, which warn that online consumers remain a primary target during major ...