phishing

4000+ Domains Used By FIN7 Actors Mimic Popular Brands

Russian-linked FIN7 (aka Sangria Tempest, ATK32, Carbon Spider, Coreid, ELBRUS, G0008, G0046, and GOLD NIAGARA) is a financial cybercrime group…

1 week ago

Hackers Using Greatness PaaS tool to Steal Microsoft 365 Login Credentials

A new Phishing-as-a-Service (PaaS) tool called Greatness is being used by cybercriminals to steal Microsoft 365 login credentials. First detected…

2 months ago

Beware Of Fake MetaMask Android Apps That Steal Login Details

Threat actors exploit fake Android apps primarily for illicit reasons, such as stealing sensitive and personal information from unsuspecting users.…

3 months ago

5 Sandbox Tools for Phishing Analysis in 2024

There is a wide variety of solutions one can use to investigate phishing attacks. Yet, in most cases, analysts can…

3 months ago

Google Sues Two Chinese Developers Over Crypto Investment App Scams

A recent lawsuit was filed by Google against two app developers, Yunfeng Sun (also known as Alphonse Sun) and Hongnam…

3 months ago

Rhadamanthys Stealer Using Weaponized PDF Files To Attack Oil And Gas Sector

Hackers use weaponized PDF files as they have the ability to incorporate malicious codes or scripts within a well-known and…

4 months ago

Researchers Unveil The Attackers Behind The Agent Tesla Campaign

Check Point Research has exposed a recent wave of cyberattacks utilizing the infamous Agent Tesla malware.┬áThis campaign targeted organizations in…

4 months ago

Hackers Using Weaponized PDF Files to Deliver Mispadu Banking Malware

Mispadu, a banking trojan initially targeting Latin America, has expanded its attacks to Europe, stealing credentials through phishing emails and…

4 months ago

Hackers Abuse Dropbox In Phishing Attack To Steal Logins

Darktrace, a leading AI-powered threat detection company, identified a sophisticated phishing attempt targeting one of its customers in January 2024.…

4 months ago

Hackers Using Weaponized ZIP File To Steal NTLM Hashes

Threat actors use ZIP files to weaponize them since they can easily convey malicious payloads within compressed archives, making it…

5 months ago