PHISHING 22
- CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign
- Phish and Chips China-Aligned Espionage Actors Ramp Up Taiwan Semiconductor Industry Targeting
- Threat Actors Exploit SVG Files in Stealthy JavaScript Redirects
- Google Gemini Tricked Into Showing Phishing Message Hidden in Email
- Deploying NetSupport RAT via WordPress & ClickFix
- Phishing Attack Deploying Malware on Indian Defense BOSS Linux
- Silent Push Uncovers Chinese Fake Marketplace e-Commerce Phishing Campaign
- Okta observes v0 AI tool used to build phishing sites
- Large Language Models (LLMs) Are Falling for Phishing Scams What Happens When AI Gives You the Wrong URL?
- DeepSeek Deception Sainbox RAT & Hidden Rootkit Delivery
- Patch and Persist Darktrace’s Detection of Blind Eagle (APT-C-36)
- Iranian Educated Manticore Targets Leading Tech Academics
- Hive0154 aka Mustang Panda shifts focus on Tibetan community to deploy Pubload backdoor
- APT36 Phishing Campaign Targets Indian Defense Using Credential-Stealing Malware
- What’s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia
- How Fraudsters Are Poisoning Search Results to Promote Phishing Sites
- Inside FluxPanel How Phishing Enables Real-Time Ecommerce Checkout Hijacks
- GitHub Device Code Phishing
- Global analysis of Adversary-in-the-Middle phishing threats
- Flask Phishing Kit Targeted Credential Theft Using Open-Source Technology
- Same Automated Impersonation for All
- Haozi’s Plug-and-Play Phishing-as-a-Service Has Facilitated $280,000 of Criminal Transactions Over Past Five Months