CybersecurityIndustrial control systemsIndustrial threatsMalwareMalware StatisticsMinerPhishingRansomwarespywareVirusWorm
Threat landscape for industrial automation systems in Q4 2025
Statistics across all threats The percentage...
Credentials theftCredit CardscrimewareCybersecurityDarknetData theftDigital forensicsFinancial malwareFinancial threatsGrandoreiroInfostealersMastercardMaverickMobile MalwareMoney theftPaypalPhishingPhishing websitesPublicationsScamSpam and phishingTrojan BankerVISAWeb threatsWindows malware
Financial cyberthreats in 2025 and the outlook for 2026
In 2025, the financial cyberthreat landscape...
AppleApple IDCybersecurityhealthcareMatt MullenwegNHSPhishingPodcastPrivacySmashing SecurityWordpress
Smashing Security podcast #459: This clever scam nearly hijacked a tech CEO’s Apple ID
In episode 459 of Smashing Security,...
Fraudsters are using public planning records to target permit applicants
If you’re in the middle of...
Your Signal account is safe – unless you fall for this trick
Signal, the encrypted messaging app trusted...
How hackers bypassed MFA with a $120 phishing kit – until a global takedown shut it down
In a co-ordinated public-private operation between...
Phishing Attacks Against People Seeking Programming Jobs
This is new. North Korean hackers...
AICybersecurityMalicious spamMoney theftNigerian SpamPhishingPhishing websitesSpam and phishingSpam and phishing reportsSpam LettersSpam StatisticsSpammer techniquesSpear phishingTelegramThematic phishingThematic spamWhatsApp
Spam and phishing in 2025
The year in figures 99% of...
CybersecurityFinancial threatsInternet of ThingsMiraiNetSupport RATPhishingRATResearchStan GhoulsTargeted attacks
Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT
Introduction Stan Ghouls (also known as...
Threat landscape for industrial automation systems in Q3 2025
Statistics across all threats In Q3...