tag
Credential Harvesting
18 posts
- Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise
- Steal Smarter, Not Harder: Malicious use of Vercel for Credential Phishing
- Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities
- The Meta 2FA Trap: From Verified Badge to Account Takeover
- Mini Shai-Hulud Spreads to Packagist: Malicious Intercom PHP Package Follows npm Compromise
- Intercom’s npm Package Compromised in Ongoing Mini Shai-Hulud Worm Attack
- Meet Bluekit: The AI-Powered All-in-One Phishing Kit
- Kuse Web App Abused to Host Phishing Document
- Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign
- Interactive Brokers Phishing Scam: Fake IRS W-8BEN Renewal Alert
- Attackers Are Impersonating a Linux Foundation Leader in Slack to Target Open Source Developers
- Weaponizing Fear: Iran Conflict-Themed Phishing Uses Fake Emergency Alerts
- One Click Away: Inside a LinkedIn Phishing Attack
- Xiaomi Phishing Attempt - Red Flags You Can't Afford to Ignore
- TeamPCP Is Systematically Targeting Security Tools Across the OSS Ecosystem
- LiveChat Abuse: How Phishers Are Exploiting SaaS Support Tools to Steal Sensitive Data
- Punchbowl Phishing Attack Explained: How Digital Invites Are Used to Steal Credentials
- PII Pillage: How Attackers Use BitPanda to Plunder Credentials