Browsing Tag
Phishing
499 posts
New Rockstar 2FA Phishing-as-a-Service Kit Targets Microsoft 365 Accounts
SUMMARY Cybersecurity researchers at Trustwave have discovered “Rockstar 2FA,” a phishing-as-a-service platform designed to help hackers and script…
December 2, 2024
OP HAECHI V: Interpol Arrests 5,500 Cybercriminals, Recovers $400 Million
SUMMARY A global operation, led by INTERPOL, nets over 5,500 cybercriminals and seizes $400 million in stolen funds.…
December 2, 2024
Why Simulating Phishing Attacks Is the Best Way to Train Employees
Despite advancements in cybersecurity tools, human vulnerability remains the weakest link, with phishing among the most dangerous forms…
December 1, 2024
Fake Betting Apps Using AI-Generated Voices to Sensitive Data
Group-IB has discovered that cybercriminals are using fake betting apps and ads with AI-generated voices to steal personal information and money. Discover the tactics used by scammers and how to avoid falling victim to these fraudulent schemes.
November 29, 2024
99% of UAE’s .ae Domains Exposed to Phishing and Spoofing
Only 1.11% of UAE's 37,926 .ae domains have implemented DMARC, leaving most vulnerable to phishing and and spoofing attacks.
November 25, 2024
US Charges 5 Suspected MGM Hackers from Scattered Spider Gang
Five alleged members of the notorious Scattered Spider hacking group have been charged with executing a sophisticated phishing…
November 21, 2024
US Government Agencies Impersonated in Aggressive DocuSign Phishing Scams
DocuSign phishing scams surged by 98%, with hundreds of daily attacks impersonating US government agencies like HHS and…
November 18, 2024
New GitLoker-Linked GoIssue Tool Targets GitHub Users for Phishing
SlashNext researchers have discovered a new, sophisticated phishing tool GoIssue targeting GitHub developers. Learn about its capabilities, the…
November 12, 2024
Microsoft Bookings Flaw Enables Account Hijacking and Impersonation
A vulnerability in Microsoft Bookings can expose your organization to serious security risks. Learn how attackers can exploit…
November 11, 2024
Hackers Deploy CRON#TRAP for Persistent Linux System Backdoors
CRON#TRAP is a new phishing attack using emulated Linux environments to bypass security and establish persistent backdoors. Leveraging…
November 5, 2024