PHISHING 34
- Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats
- New Phishing Attack Via OneDrive Attacking C-level Employees for Corporate Credentials
- New Phishing Campaign Abuses ConnectWise ScreenConnect to Take Over Devices
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing
- New Gmail Phishing Attack Uses AI Prompt Injection to Evade Detection
- Hackers Weaponize QR Codes Embedded with Malicious Links to Steal Sensitive Information
- GenAI Used For Phishing Websites Impersonating Brazil’s Government
- Mozilla flags phishing wave aimed at hijacking trusted Firefox add-ons
- Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing
- Exploiting Direct Send Attackers Abuse Microsoft 365 to Deliver Internal Phishing Attacks
- RedHook A New Android Banking Trojan Targeting Users in Vietnam
- BIDI Swap Unmasking the Art of URL Misleading with Bidirectional Text Tricks
- CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign
- Phish and Chips China-Aligned Espionage Actors Ramp Up Taiwan Semiconductor Industry Targeting
- Threat Actors Exploit SVG Files in Stealthy JavaScript Redirects
- Google Gemini Tricked Into Showing Phishing Message Hidden in Email
- Deploying NetSupport RAT via WordPress & ClickFix
- Phishing Attack Deploying Malware on Indian Defense BOSS Linux
- Silent Push Uncovers Chinese Fake Marketplace e-Commerce Phishing Campaign
- Okta observes v0 AI tool used to build phishing sites
- Large Language Models (LLMs) Are Falling for Phishing Scams What Happens When AI Gives You the Wrong URL?
- DeepSeek Deception Sainbox RAT & Hidden Rootkit Delivery
- Patch and Persist Darktrace’s Detection of Blind Eagle (APT-C-36)
- Iranian Educated Manticore Targets Leading Tech Academics
- Hive0154 aka Mustang Panda shifts focus on Tibetan community to deploy Pubload backdoor
- APT36 Phishing Campaign Targets Indian Defense Using Credential-Stealing Malware
- What’s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia
- How Fraudsters Are Poisoning Search Results to Promote Phishing Sites
- Inside FluxPanel How Phishing Enables Real-Time Ecommerce Checkout Hijacks
- GitHub Device Code Phishing
- Global analysis of Adversary-in-the-Middle phishing threats
- Flask Phishing Kit Targeted Credential Theft Using Open-Source Technology
- Same Automated Impersonation for All
- Haozi’s Plug-and-Play Phishing-as-a-Service Has Facilitated $280,000 of Criminal Transactions Over Past Five Months