“Axelrod Rewards” Scam

The “Axelrod Rewards” scam isn’t legitimate—it’s a cryptocurrency drainer phishing scheme designed to trick users into connecting their wallets. Once connected, malicious…

ITFunk Research
2 Min Read

Noice Rewards Scam

Threat Overview FieldDetailsThreat typePhishing / Scam / Social Engineering / Fraud / Cryptocurrency DrainerDetection namesFortinet (Spam), multiple detections via VirusTotalSymptoms…

ITFunk Research
3 Min Read

“Your Statement Is Available For Review” Email Virus

The "Your Statement Is Available For Review" email is part of a malicious spam (malspam) campaign designed to deceive recipients into installing…

ITFunk Research
3 Min Read

.dlock Ransomware

The .dlock Ransomware, also known as Deadlock Ransomware, is a dangerous cyber threat that encrypts files across your computer and demands a…

ITFunk Research
3 Min Read

Verification Failed Email Scam

The Verification Failed Email Scam is a phishing campaign that tricks users into believing they failed a reCAPTCHA verification and must take urgent action. The…

ITFunk Research
3 Min Read

“Shared Document – Business Proposal And Product List” Email Scam

The "Shared Document – Business Proposal And Product List" email is a phishing scam disguised as a legitimate Google Docs…

ITFunk Research
3 Min Read

Yala NFT Giveaway Scam

The Yala NFT Giveaway Scam is a deceptive crypto-draining scheme that poses as a free NFT gift. It impersonates the legitimate Yala…

ITFunk Research
3 Min Read

AMP Token Airdrop Scam

The AMP Token Airdrop Scam is a sophisticated phishing operation that deceives users by impersonating legitimate AMP token (a collateral…

ITFunk Research
4 Min Read

PKI Management Systems: A Business Guide to Secure Digital Identities

A Public Key Infrastructure (PKI) management system is a framework of technologies and processes that manage digital certificates and encryption…

ITFunk Research
3 Min Read

DevSecOps Integration: Embedding Security into Your Development Pipeline

As cyber threats grow more sophisticated, businesses must rethink their approach to software development. Traditional DevOps practices emphasize speed and…

ITFunk Research
4 Min Read