Select Page

This report explores how phishing attacks trick victims with malicious browser extensions, credential stealing, technical support scams, rogue software, gift and prize scams.