tag
Phishing
47 posts
- Lookalike Domains Expose the iPhone Theft Economy
- LATAM Under Siege: Agent Tesla’s 18-Month Credential Theft Campaign Against Chilean Enterprises
- Types and Prevention of Payment Fraud
- Steal Smarter, Not Harder: Malicious use of Vercel for Credential Phishing
- New Phishing Campaign Targets US with Credential Theft: What CISOs Need to Know
- Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities
- “Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security
- Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise
- DFIR: From alert to root cause using Osquery without leaving Elastic Security
- Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India
- Email threat landscape: Q1 2026 trends and insights
- Kuse Web App Abused to Host Phishing Document
- Phishing-to-RMM Attacks: The Remote Access Blind Spot CISOs Can’t Ignore
- Inside agenteV2: How Brazilian Attackers Use Fake Court Summons to Steal Banking Credentials in Real Time
- Intelligence Center
- Weaponizing Apathy: How Threat Actors Exploit Vulnerabilities and Legitimate Software
- Intelligence Center
- BlobPhish: The Phantom Phishing Campaign Hiding in Browser Memory
- Intelligence Center
- Identity Protection in the AI Era
- When Trust Becomes a Weapon: Google Cloud Storage Phishing Deploying Remcos RAT
- Interactive Brokers Phishing Scam: Fake IRS W-8BEN Renewal Alert
- How Phishing Is Targeting Germany’s Economy: Active Threats from Finance to Manufacturing
- From Tax Refund to Total Compromise: IRS-Themed Phishing Email Drives Full-Stack Financial Fraud
- The Growing Abuse of GitHub and GitLab in Phishing Campaigns
- Weaponizing Fear: Iran Conflict-Themed Phishing Uses Fake Emergency Alerts
- NCSC warns of messaging app targeting
- Intelligence Center
- One Click Away: Inside a LinkedIn Phishing Attack
- Incident responders, s'il vous plait: Invites lead to odd malware events
- Xiaomi Phishing Attempt - Red Flags You Can't Afford to Ignore
- Widespread GitHub Campaign Uses Fake VS Code Security Alerts to Deliver Malware
- No Reach, No Risk: The Keitaro Abuse in Modern Cybercrime Distribution
- Threat Brief: Recruiting Scheme Impersonating Palo Alto Networks Talent Acquisition Team
- When tax season becomes cyberattack season: Phishing and malware campaigns using tax-related lures
- Copyright Lures Mask a Multi‑Stage PureLog Stealer Attack on Key Industries
- TrendAI™ Supports Global Law Enforcement Efforts
- LiveChat Abuse: How Phishers Are Exploiting SaaS Support Tools to Steal Sensitive Data
- The Iran War: What You Need to Know
- Initial access techniques used by Iran-based threat actors
- OAuth Device Code Phishing: A New Microsoft 365 Account Breach Vector
- Fake imToken Chrome Extension Steals Seed Phrases via Phishing Redirects
- Punchbowl Phishing Attack Explained: How Digital Invites Are Used to Steal Credentials
- PII Pillage: How Attackers Use BitPanda to Plunder Credentials
- Alert: NCSC advises UK organisations to take action following conflict in the Middle East
- Abusing .arpa: The TLD That Isn’t Supposed to Host Anything
- Weekly Recap — 2026-05-04 -> 2026-05-11