Hackers Acquire Corporate Logins From SMS Phishing And Support Desk Calls
A financially driven threat group, UNC3944 has frequently employed phone-based social engineering and SMS phishing attacks to gain credentials and escalate access to target organizations.
The hacking group has been observed to target a wide range...
Attackers Weaponizing QR Codes to Steal Employees Microsoft Credentials
A recent discovery highlights a significant QR code phishing campaign that targets Microsoft credentials across various industries.
Notably, a major energy company based in the US is at the forefront of this attack, underscoring the...
Mass Phishing Campaign Attacking Zimbra Users’ to Steal Login Credentials
A group of researchers recently published a significant mass-spreading phishing campaign. It targets Zimbra account users, shedding light on a campaign that has been active since April 2023.
This article delves into the intricate details...
New Phishing Attack Exploits Cloudflare R2 Hosting Service to Steal Cloud Passwords
The Cloudflare R2 hosting service like the following platforms, which provides a cost-effective large-scale data storage platform to developers with no exit bandwidth charges:-
Amazon S3
Google GCS
Azure Blob Storage
For beta testing, the Cloudflare R2 was...
Hackers Leverage Websites hosted on AWS S3 Buckets to Send Phishing Links
Hackers use legitimate Amazon Web Services (AWS) S3 buckets to send phishing emails.
Recent trends have seen cybercriminals leveraging well-known platforms like Google, QuickBooks, and PayPal to send out phishing emails, making detection challenging for...
Interpol Shut Down Phishing-As-A-Service (PAAS) Platform That Hacked 70,000 Users
Interpol Shut Down Phishing-As-A-Service (PAAS) Platform That Hacked 70,000 Users. Due to phishing-as-a-service (PAAS) platforms, cybercriminals typically have a one-stop shop to conduct phishing attacks.
These platforms include email distribution, ready-made phishing kits for recognizable companies, hosting,...
Hackers Use WebAPK to Install Malware as Native Application on Android Device
The latest research reveals a new sophisticated attack carried through Webapk technology targeting Android devices.
The threat actors manipulate the user to install malicious web apk through a Smishing attempt by impersonating legit banking sources.
The...
Beware of New Phishing Attacks Mimicking Booking.com and Airbnb
Beware of attackers masquerading as well-known vacation rental websites such as Airbnb and Booking.com.
Scammers that prey on tourists for Phishing Attacks are more active once the summer travel season is in full force.
It is...
The Future of Email Security With AI : Guide To Combat Sophisticated Email Threats...
The precautions and techniques that have been put in place for the protection of email messages from unauthorized access, interception or manipulation is regarded as email security.
This includes the protection of confidential information, integrity,...
Facebook Phishing Attack Chain Infrastructure Uncovered
Phishing campaigns are still the most effective way to hack a person, spread malware, infiltrate an organization or conduct any cybercriminal activities.
Though several security measures have been taken against phishing campaigns, threat actors...