• Skip to main content
  • Skip to after header navigation
  • Skip to site footer
CyberInsider

CyberInsider

Reliable cybersecurity news and resources

General

  • Home
  • News
    • Android
    • Cloud
    • Data Breach
    • Hardware
    • IOS
    • Legal
    • Linux
    • Mac
    • Phishing
    • Privacy
    • Ransomware
    • Security
    • Software
    • Windows
  • Email
    • Secure Email
    • Proton Mail Review
    • Tuta Mail Review
    • Mailfence Review
    • Mailbox.org Review
    • StartMail Review
    • Best Encrypted Email
  • Password
    • Best Password Managers
      • Best Windows Password Manager
      • Best Mac Password Manager
      • Best iPhone Password Manager
      • Best Android Password Manager
      • Best Family Password Manager
    • Comparisons
      • Bitwarden vs Proton Pass
      • NordPass vs 1Password
      • LastPass vs NordPass
      • RoboForm vs NordPass
      • Bitwarden vs NordPass
      • Proton Pass vs NordPass
      • 1Password vs Proton Pass
      • RoboForm vs Proton Pass
    • Proton Pass Review
    • NordPass Review
    • 1Password Review
    • KeePass Review
    • Dashlane Review
    • LastPass Review
    • Bitwarden Review
  • Identity
    • Best Identity Theft Protection Services
    • Aura Review
    • Identity Guard Review
    • NordProtect Review
    • LifeLock Review
    • Experian IdentityWorks Review
    • IDShield Review
    • Aura vs LifeLock
    • Identity Guard vs Aura
  • VPN
    • VPN Reviews
      • NordVPN Review
      • Surfshark VPN Review
      • ExpressVPN Review
      • Proton VPN Review
      • Mullvad VPN Review
      • IPVanish Review
      • PIA Review
    • Best VPN Services
      • Best VPN for iPhone
      • Best VPN for Canada
      • Best VPN for China
      • VPN for Static IP
      • Best VPN for Firestick
      • Best VPN for Gaming
      • Best VPN for Netflix
      • Best VPN for Streaming
      • Best VPN for Torrenting
      • Best VPN for Mac
      • Best VPN for Windows
      • Best Free VPN
      • VPN with Antivirus
      • VPN with Ad Blocking
    • VPN Comparisons
      • NordVPN vs Surfshark
      • ExpressVPN vs NordVPN
      • NordVPN vs Proton VPN
      • Mullvad vs NordVPN
      • ExpressVPN vs Surfshark
      • Surfshark vs Proton VPN
    • VPN Coupons
      • NordVPN Coupon
      • Proton VPN Coupon
      • Surfshark Coupon
    • Free Trial VPNs
    • Cheap VPNs
  • Data Removal
    • Best Data Removal Services
    • DeleteMe Review
    • Incogni Review
    • Optery Review
    • Comparisons
      • Incogni vs DeleteMe
      • Optery vs Incogni
      • Aura vs Incogni
    • Delete your Digital Footprint
  • Tools
    • Secure Browser
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Best Password Managers
    • Secure Messaging Apps
  • Info
    • About
    • Newsletter
    • Contact

Latest News

  • APT28 revives advanced malware toolkit used in cyber-espionage ops
  • Signal and WhatsApp accounts of govt. officials targeted by Russian hackers
  • ShinyHunters claims hundreds of victims in new “Salesforce Aura” campaign
  • Claude AI finds 22 Firefox vulnerabilities in two weeks of testing

About

CyberInsider covers the latest news in the cybersecurity and data privacy world. In addition to news, we also publish in-depth guides and resources.
See our Mission >

  • Home
  • News
    • Android
    • Cloud
    • Data Breach
    • Hardware
    • IOS
    • Legal
    • Linux
    • Mac
    • Phishing
    • Privacy
    • Ransomware
    • Security
    • Software
    • Windows
  • Email
    • Secure Email
    • Proton Mail Review
    • Tuta Mail Review
    • Mailfence Review
    • Mailbox.org Review
    • StartMail Review
    • Best Encrypted Email
  • Password
    • Best Password Managers
      • Best Windows Password Manager
      • Best Mac Password Manager
      • Best iPhone Password Manager
      • Best Android Password Manager
      • Best Family Password Manager
    • Comparisons
      • Bitwarden vs Proton Pass
      • NordPass vs 1Password
      • LastPass vs NordPass
      • RoboForm vs NordPass
      • Bitwarden vs NordPass
      • Proton Pass vs NordPass
      • 1Password vs Proton Pass
      • RoboForm vs Proton Pass
    • Proton Pass Review
    • NordPass Review
    • 1Password Review
    • KeePass Review
    • Dashlane Review
    • LastPass Review
    • Bitwarden Review
  • Identity
    • Best Identity Theft Protection Services
    • Aura Review
    • Identity Guard Review
    • NordProtect Review
    • LifeLock Review
    • Experian IdentityWorks Review
    • IDShield Review
    • Aura vs LifeLock
    • Identity Guard vs Aura
  • VPN
    • VPN Reviews
      • NordVPN Review
      • Surfshark VPN Review
      • ExpressVPN Review
      • Proton VPN Review
      • Mullvad VPN Review
      • IPVanish Review
      • PIA Review
    • Best VPN Services
      • Best VPN for iPhone
      • Best VPN for Canada
      • Best VPN for China
      • VPN for Static IP
      • Best VPN for Firestick
      • Best VPN for Gaming
      • Best VPN for Netflix
      • Best VPN for Streaming
      • Best VPN for Torrenting
      • Best VPN for Mac
      • Best VPN for Windows
      • Best Free VPN
      • VPN with Antivirus
      • VPN with Ad Blocking
    • VPN Comparisons
      • NordVPN vs Surfshark
      • ExpressVPN vs NordVPN
      • NordVPN vs Proton VPN
      • Mullvad vs NordVPN
      • ExpressVPN vs Surfshark
      • Surfshark vs Proton VPN
    • VPN Coupons
      • NordVPN Coupon
      • Proton VPN Coupon
      • Surfshark Coupon
    • Free Trial VPNs
    • Cheap VPNs
  • Data Removal
    • Best Data Removal Services
    • DeleteMe Review
    • Incogni Review
    • Optery Review
    • Comparisons
      • Incogni vs DeleteMe
      • Optery vs Incogni
      • Aura vs Incogni
    • Delete your Digital Footprint
  • Tools
    • Secure Browser
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Best Password Managers
    • Secure Messaging Apps
  • Info
    • About
    • Newsletter
    • Contact

Phishing

The latest phishing news:

New Automated Device Code Phishing Technique Bypasses FIDO Protection
News Phishing

New Automated Device Code Phishing Technique Bypasses FIDO Protection

April 28, 2025 by Bill Mann
Google Exploit Bypasses DKIM Protections to Deliver Realistic Alerts
News Phishing

Google Exploit Bypasses DKIM Protections to Deliver Realistic Alerts

April 21, 2025 by Amar Ćemanović
France Sends 2.5M Phishing Emails to Test Students, 1 in 12 Took the Bait
News Phishing

France Sends 2.5M Phishing Emails to Test Students, 1 in 12 Took the Bait

March 28, 2025 by Amar Ćemanović
Counter-Strike 2 Players Targeted by Browser-in-the-Browser Phishing
News Phishing

Counter-Strike 2 Players Targeted by Browser-in-the-Browser Phishing

March 25, 2025 by Amar Ćemanović
Have I Been Pwned Creator Troy Hunt Had Mailchimp Account Phished
News Phishing

Have I Been Pwned Creator Troy Hunt Had Mailchimp Account Phished

March 25, 2025 by Amar Ćemanović
Polymorphic Chrome Extensions Impersonate Password Managers to Steal Credentials
News Phishing

Polymorphic Chrome Extensions Impersonate Password Managers to Steal Credentials

March 6, 2025 by Amar Ćemanović
Hackers Use Device Code Phishing to Hijack Microsoft 365 Accounts
News Phishing

Hackers Use Device Code Phishing to Hijack Microsoft 365 Accounts

February 14, 2025 by Amar Ćemanović
SVG Phishing Attacks Escalate, Now Using CAPTCHA for Evasion
News Phishing

SVG Phishing Attacks Escalate, Now Using CAPTCHA for Evasion

February 6, 2025 by Amar Ćemanović
New AiTM PhaaS Platform ‘Sneaky 2FA’ Targets Microsoft 365 Accounts
News Phishing

New AiTM PhaaS Platform ‘Sneaky 2FA’ Targets Microsoft 365 Accounts

January 20, 2025 by Amar Ćemanović
Star Blizzard Targets WhatsApp Accounts in Tricky QR Code Attack
News Phishing

Star Blizzard Targets WhatsApp Accounts in Tricky QR Code Attack

January 17, 2025 by Amar Ćemanović
Massive Google Ads Phishing Campaign Targets Advertisers
News Phishing

Massive Google Ads Phishing Campaign Targets Advertisers

January 16, 2025 by Bill Mann
Threat Actors Exploit HubSpot to Harvest Microsoft Azure Credentials
Cloud News Phishing

Threat Actors Exploit HubSpot to Harvest Microsoft Azure Credentials

December 18, 2024 by Amar Ćemanović
Microsoft Teams Exploited in Attacks Delivering DarkGate Malware
News Phishing

Microsoft Teams Exploited in Attacks Delivering DarkGate Malware

December 13, 2024 by Bill Mann
International 'Phone Phishing' Gang Dismantled in Europe
Legal News Phishing

International ‘Phone Phishing’ Gang Dismantled in Europe

December 9, 2024 by Alex Lekander
Threat Actors Exploit Windows Archive Support to Evade Secure Email Gateways
News Phishing

Threat Actors Exploit Windows Archive Support to Evade Secure Email Gateways

November 28, 2024 by Alex Lekander
CryptoLove: Deep Dive Into a Sophisticated Cryptocurrency Theft Empire
News Phishing

CryptoLove: Deep Dive Into a Sophisticated Cryptocurrency Theft Empire

November 28, 2024 by Alex Lekander
Microsoft Cracks Down on ONNX Phishing-as-a-Service Operation
Legal News Phishing

Microsoft Cracks Down on ONNX Phishing-as-a-Service Operation

November 22, 2024 by Alex Lekander
‘SilkSpecter’ Campaign Uses 4,000 Fake Domains Against Black Friday Shoppers
News Phishing

‘SilkSpecter’ Campaign Uses 4,000 Fake Domains Against Black Friday Shoppers

November 14, 2024 by Alex Lekander
  • Previous
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Next

Sidebar

LATEST NEWS

APT28 revives advanced malware toolkit used in cyber-espionage ops

APT28 revives advanced malware toolkit used in cyber-espionage ops

Signal and WhatsApp accounts of govt. officials targeted by Russian hackers

Signal and WhatsApp accounts of govt. officials targeted by Russian hackers

ShinyHunters claims hundreds of victims in new “Salesforce Aura” campaign

ShinyHunters claims hundreds of victims in new “Salesforce Aura” campaign

Claude AI finds 22 Firefox vulnerabilities in two weeks of testing

Claude AI finds 22 Firefox vulnerabilities in two weeks of testing

White House orders federal crackdown on online scam networks

White House orders federal crackdown on online scam networks

IBM partners with Signal to develop quantum-safe messaging encryption

IBM partners with Signal to develop quantum-safe messaging encryption

Viber Messenger TLS flaw breaks Cloak proxy mode and exposes users

Viber Messenger TLS flaw breaks Cloak proxy mode and exposes users

Mullvad’s new GotaTun protocol passes first independent audit

Mullvad’s new GotaTun protocol passes first independent audit

Flaw in IPVanish for macOS allows attackers to gain root access

Flaw in IPVanish for macOS allows attackers to gain root access

FBI probes suspected security breach in wiretap warrant system

FBI probes suspected security breach in wiretap warrant system

Connect

About Us

Contact

Newsletter
  • X
  • Facebook
  • LinkedIn
  • YouTube

news topics

  • Security
  • Data Breach
  • Ransomware
  • Legal
  • Software
  • Windows
  • Privacy
  • Hardware
  • Android
  • iOS
  • Phishing
  • Cloud

Reviews

  • Secure Email Services
  • Password Managers
  • Secure Browsers
  • Best VPN Services
  • Identity Theft Protection
  • Private Search Engines
  • Best Data Removal Services

Copyright © 2026 · CyberInsider.com · All Rights Reserved · Privacy Policy ·  Terms of Use · Contact