The phishing campaigns target those applying for land-use permits, using details like property addresses, case numbers, and...
phishing
LastPass has alerted users regarding the delivery of fraudulent security alerts aimed at exfiltrating master passwords as...
Russian phishing campaign hits Ukraine with novel malware Attacks delivering novel malicious payloads have been deployed by...
Major phishing-as-a-service platform Tycoon 2FA has been disrupted following a Microsoft-led operation that involved Europol and half...
The attackers are using compromised Extended Validation (EV) certificates, specifically one issued to TrustConnect Software PTY LTD,...
The report highlights a shift towards stealth and efficiency, with threat actors prioritizing speed, automation, and return...
Starkiller operates by launching a headless Chrome browser within a Docker container, acting as a reverse proxy...
The OAuth URLs intentionally include an invalid scope, forcing redirection to malicious sites.
The attack uses social engineering and PWA features, making users believe they are interacting with a legitimate...
Attackers are using IPv6 address ranges to gain control over .arpa subdomains, pointing them to servers hosting...