Phishing
- APPLICATIONS
Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign
Jun 19, 2025Ravie LakshmananEmail Security / Identity Protection Threat actors with suspected ties to Russia have been observed taking advantage…
Read More » - APPLICATIONS
New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains
A new campaign is making use of Cloudflare Tunnel subdomains to host malicious payloads and deliver them via malicious attachments…
Read More » - APPLICATIONS
Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages
Microsoft has shed light on a previously undocumented cluster of threat activity originating from a Russia-affiliated threat actor dubbed Void…
Read More » - APPLICATIONS
FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign
May 27, 2025Ravie LakshmananData Breach / Social Engineering The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering…
Read More » - APPLICATIONS
How to Detect Phishing Attacks Faster: Tycoon2FA Example
It takes just one email to compromise an entire system. A single well-crafted message can bypass filters, trick employees, and…
Read More » - APPLICATIONS
Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails
May 14, 2025Ravie LakshmananWindows Security / Threat Intelligence Cybersecurity researchers have discovered a new phishing campaign that’s being used to…
Read More » - APPLICATIONS
MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks
May 02, 2025Ravie LakshmananMalware / Threat Intelligence The malware loader known as MintsLoader has been used to deliver a PowerShell-based…
Read More » - REVIEWS
Phishing attacks that defeat MFA are easier than ever. So what are we to do?
An entire cottage industry has formed around phishing attacks that bypass some of the most common forms of multifactor authentication…
Read More » - APPLICATIONS
Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
Apr 28, 2025Ravie LakshmananCybersecurity / Hacking News What happens when cybercriminals no longer need deep skills to breach your defenses?…
Read More »