
SVG: The Trojan Horse hiding in your inbox
A silent revolution in phishing tactics is underway. Over the last six months, the SVG image format has emerged as a preferred delivery method for malicious payloads in email-based attacks.
A silent revolution in phishing tactics is underway. Over the last six months, the SVG image format has emerged as a preferred delivery method for malicious payloads in email-based attacks.
Cybercriminals are leveraging AI-generated TikTok videos to distribute info-stealing malware disguised as cracked software and game cheats. These videos often feature avatars promoting links to malicious websites that host RedLine
Threat actors are distributing the Bumblebee malware through malicious websites impersonating legitimate download pages for Zenmap and WinMTR. These fake sites appear prominently in search engine results due to SEO
+ 41 22 588 65 90 (24/7 hotline)
emergency@zendata.security
While we’re processing your request, there are some things you can do to prevent a disaster.
Stay up to date with the latest threats, stories, events and analysis, sign up for our monthly cybersecurity newsletter.
Since 2011, we have been supporting businesses, governments, and educational organizations. We’ve partnered with international organisations and law enforcement to provide you with the fastest and most efficient threat response.
Rte de Frontenex, 62Bis,
1207, Geneva
Switzerland
Office 1201,
Almoayyed TowerAI, Seef,
Bahrain
Office 603, Centro Capital Center,
Abu Dhabi Exhibition Center,
Khaleej Al Arabi St, Abu Dhabi,
UAE
Building Montana,
D84 Zaa’beel Street, Dubai,
UAE
90 EU Tong Sen Street
#03-02B, Singapore, 059811
Singapore