In a disturbing development, cyber attackers have devised a new method to carry out targeted phishing attacks. It is via using encrypted RPMSG attachments…
phishing attack
Spanish Police Dismantle Phishing Operation and Arrest 40 Individuals
In an extensive operation, the Spanish National Police arrest 40 individuals. This includes 15 members of a criminal organization and two hackers, for their…
Trezor Crypto Wallets – Major Phishing Campaign
In recent years, cryptocurrencies have gained a lot of attention as an investment opportunity, with more and more people getting involved in the market.…
The 0ktapus Phishing Attack: Campaign: The Most Prolific Phish
Global cybersecurity leader, Group-IB, has discovers that 9,931 thousand accounts from over 130 organisations were under compromise. It was because of a massive phishing…
Anyone may start Microsoft 365 phishing attacks using the caffeine service.
Threat actors can easily launch attacks thanks to the “Caffeine” phishing-as-a-service (PhaaS) platform (Microsoft 365 Phishing Attacks), which has an open registration process that…
Phishing attacks using Microsoft 365 pose as US government agencies.
A continuous phishing attacks that targets U.S. government contractors has grown in scope and is now pushing more effective lures and documents. These phishing…
Reverse tunnelling and URL shorteners are tools used by cybercriminals to run “nearly undetected” phishing attacks.
Threat actors can now avoid some of the most powerful phishing defences thanks to a new hacking approach. Criminal organizations are using a new…
Phishing attacks using WeTransfer that uses the Lampion malware
Threat actors are now employing WeTransfer to spread the Lampion malware in bigger quantities as part of their phishing efforts. WeTransfer is a legitimate…
All Hackers Can Utilize Sophisticated Phishing Techniques Thanks To The New EvilProxy Service
With the promise of stealing authentication tokens to get around multi-factor authentication (MFA) on Apple, Google, Facebook, Microsoft, Twitter, GitHub, GoDaddy, and even PyPI.…
Email is still vulnerable: Brute Force Attacks increasing
Emails are still a viable attack vector, despite the fact that phishing techniques are constantly being improved. Threat actors are using brute force attacks…