HackDig : Dig high-quality web security articles

Spear phish, whale phish, regular phish: What’s the difference?

There are many types of phishing attack nowadays, to the extent it can be tricky to keep up with them all. We have unique names for mobile attacks, postal attacks, threats sent via SMS and many more besides. However, we often see folks mix up their spears and their whales, and even occasionally confuse them with regular phish attempts. We’re here to ex
Publish At:2021-12-13 16:41 | Read:1912 | Comments:0 | Tags:101 Business Email Compromise phishing spear whale whaling

Anti-Phishing: How the DNC could have prevented the Russian cyberattack

It’s 3:45 pm on Friday and you are ready to be done for the week. A last-minute email from your boss pops into your inbox. It’s a Google file invitation that says you need to update this document before the end of the day. Being the dedicated employee that you are, you click the link and end up at a Google login page. The login page displays your name
Publish At:2016-11-04 02:25 | Read:6559 | Comments:0 | Tags:Phishing cyber attack election phishing spear

New Chrome Extension Blocks BeEF Attacks

An engineer has devised a new way to help combat BeEF, or browser exploit framework attacks.The tool, a Chrome extension, detects and blocks hooks from BeEF–an exploit tool similar to Metasploit–that uses JavaScript to control browsers. Routinely used by researchers, pen testers, and attackers, the tool has a multifunctional control panel that al
Publish At:2015-06-26 16:20 | Read:5335 | Comments:0 | Tags:Web Security attack tools BeEF attacks Brian Wallace Browser


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud