In recent years, cryptocurrencies have gained a lot of attention as an investment opportunity, with more and more people getting involved in the market.…
phishing attack
The 0ktapus Phishing Attack: Campaign: The Most Prolific Phish
Global cybersecurity leader, Group-IB, has discovers that 9,931 thousand accounts from over 130 organisations were under compromise. It was because of a massive phishing…
Anyone may start Microsoft 365 phishing attacks using the caffeine service.
Threat actors can easily launch attacks thanks to the “Caffeine” phishing-as-a-service (PhaaS) platform (Microsoft 365 Phishing Attacks), which has an open registration process that…
Phishing attacks using Microsoft 365 pose as US government agencies.
A continuous phishing attacks that targets U.S. government contractors has grown in scope and is now pushing more effective lures and documents. These phishing…
Reverse tunnelling and URL shorteners are tools used by cybercriminals to run “nearly undetected” phishing attacks.
Threat actors can now avoid some of the most powerful phishing defences thanks to a new hacking approach. Criminal organizations are using a new…
Phishing attacks using WeTransfer that uses the Lampion malware
Threat actors are now employing WeTransfer to spread the Lampion malware in bigger quantities as part of their phishing efforts. WeTransfer is a legitimate…
All Hackers Can Utilize Sophisticated Phishing Techniques Thanks To The New EvilProxy Service
With the promise of stealing authentication tokens to get around multi-factor authentication (MFA) on Apple, Google, Facebook, Microsoft, Twitter, GitHub, GoDaddy, and even PyPI.…
Email is still vulnerable: Brute Force Attacks increasing
Emails are still a viable attack vector, despite the fact that phishing techniques are constantly being improved. Threat actors are using brute force attacks…
Microsoft Teams App: New security for phishing attacks
Microsoft Teams app has acquired new Defender ‘Safe Links’ phishing security to ensure clients against possibly hazardous phishing URLs. The extra phishing security in…
PDF attachments a long line of Phishing Campaign
Robbing corporate credentials is a worthwhile business in the black markets. Attackers have been found to go to different lengths to get those. Presently,…