Tag: phishing
-
Storm-2561 targets enterprise VPN users with SEO poisoning, fake clients
vpn-fortinet[.]com and ivanti-vpn[.]org, hosting malicious ZIP files on GitHub, the advisory said.The malware itself arrives as a ZIP file containing a Windows Installer package. When a user launches the downloaded installer, it drops a fake Pulse Secure application into a directory that closely mimics a legitimate Pulse Secure installation path, Microsoft said.”This installation path blends…
-
Storm-2561 targets enterprise VPN users with SEO poisoning, fake clients
vpn-fortinet[.]com and ivanti-vpn[.]org, hosting malicious ZIP files on GitHub, the advisory said.The malware itself arrives as a ZIP file containing a Windows Installer package. When a user launches the downloaded installer, it drops a fake Pulse Secure application into a directory that closely mimics a legitimate Pulse Secure installation path, Microsoft said.”This installation path blends…
-
Iran War Bait Fuels TA453, TA473 Phishing Campaigns
Tags: cloud, credentials, cyber, espionage, exploit, government, iran, malware, middle-east, phishing, service, theft, threatTA453, TA473, and several emerging threat clusters are exploiting breaking news about the Iran war to run highly targeted phishing campaigns against governments and policy organizations across the Middle East and beyond. These operations blend traditional espionage with opportunistic credential theft and malware delivery, often abusing compromised government accounts and trusted cloud services to increase…
-
Microsoft Copilot Email and Teams Summarization Flaw Opens Door to Phishing Attacks
Artificial intelligence assistants have transformed daily business operations, helping teams manage overflowing inboxes and summarize complex communications. Microsoft Copilot integrates directly into these workflows, pulling context from various Microsoft 365 applications to streamline tasks. However, this convenience introduces a new security boundary: what happens when Copilot follows hidden instructions written by an attacker inside an…
-
Breach Roundup: Russian State Actors Target Signal, WhatsApp
Also, More ClickFix Attacks and Teen Booters Arrested in Poland. This week, Russian hackers targeted Signal and WhatsApp users, permit-fee phishing hit U.S. applicants, ClickFix on WordPress sites, Microsoft patched 80 bugs, a 14K-router botnet, Polish teens held over DDoS tools and Finland warned of Russian, Chinese espionage. North Korean IT workers for hire. First…
-
Hackers Use Cloudflare Human Check to Hide Microsoft 365 Phishing Pages
Scammers are hijacking popular security tools like Cloudflare to hide fake Microsoft 365 login pages. Learn how this new invisible phishing campaign bypasses antivirus software and how you can stay safe. First seen on hackread.com Jump to article: hackread.com/hackers-cloudflare-human-check-microsoft-365-phishing/
-
Coalition of information-sharing groups warns of cyber, physical attacks
A joint advisory says Iran-linked groups are targeting U.S. critical infrastructure using DDoS, phishing and other retaliatory techniques. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/information-sharing-groups-warns-cyber-physical-attacks/814539/
-
Professionelles Spear Phishing setzt zunehmend auf Messenger-Dienste
Mit solchen Lösungen können Unternehmen ihre Risiken deutlich reduzieren und ihre Mitarbeiter zur besten Verteidigungslinie gegen Cyberangriffe machen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/professionelles-spear-phishing-setzt-zunehmend-auf-messenger-dienste/a44105/
-
How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs
Phishing has quietly turned into one of the hardest enterprise threats to expose early. Instead of crude lures and obvious payloads, modern campaigns rely on trusted infrastructure, legitimate-looking authentication flows, and encrypted traffic that conceals malicious behavior from traditional detection layers. For CISOs, the priority is now clear: scale phishing detection in a way that…
-
ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More
Another Thursday, another pile of weird security stuff that somehow happened in just seven days. Some of it is clever. Some of it is lazy. A few bits fall into that uncomfortable category of “yeah”¦ this is probably going to show up in real incidents sooner than we’d like.”The pattern this week feels familiar in…
-
Attackers Don’t Just Send Phishing Emails. They Weaponize Your SOC’s Workload
The most dangerous phishing campaigns aren’t just designed to fool employees. Many are designed to exhaust the analysts investigating them. When a phishing investigation takes 12 hours instead of five minutes, the outcome can shift from a contained incident to a breach.For years, the cybersecurity industry has focused on the front door of phishing defense:…
-
Hackers Exploit CloudFlare Anti-Security to Steal Microsoft 365 Login Credentials
A recent Microsoft 365 credential harvesting campaign shows how attackers are exploiting CloudFlare’s protective features to shield malicious phishing sites from security scanners and threat researchers. CloudFlare is widely used by organizations to improve website performance and protect against attacks such as bots, DDoS, and automated scanning. However, these same protections can also unintentionally benefit…
-
Hackers Exploit CloudFlare Anti-Security to Steal Microsoft 365 Login Credentials
A recent Microsoft 365 credential harvesting campaign shows how attackers are exploiting CloudFlare’s protective features to shield malicious phishing sites from security scanners and threat researchers. CloudFlare is widely used by organizations to improve website performance and protect against attacks such as bots, DDoS, and automated scanning. However, these same protections can also unintentionally benefit…
-
Phishers hide scam links with IPv6 trick in “free toothbrush” emails
United Healthcare impersonators are using an IPv6 trick to hide the real destination of phishing links in emails promising free Oral-B toothbrushes. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/phishers-hide-scam-links-with-ipv6-trick-in-free-toothbrush-emails/
-
Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes
Agentic web browsers that leverage artificial intelligence (AI) capabilities to autonomously execute actions across multiple websites on behalf of a user could be trained and tricked into falling prey to phishing and scam traps.The attack, at its core, takes advantage of AI browsers’ tendency to reason their actions and use it against the model itself…
-
BlackSanta Malware Shuts Down Protections, Targets HR and Recruiting Operations
Russian threat actors for more than a year have targeted HR and recruiting operations in a sophisticated phishing and infostealing campaign that includes a component, dubbed BlackSanta, that can shut down antivirus tools and EDR protections before deploying the malware that exfiltrates data, Aryaka researchers say. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/blacksanta-malware-shuts-down-protections-targets-hr-and-recruiting-operations/
-
SOAR Cybersecurity
Cybersecurity teams today face a relentless wave of cyber threats. Organizations must defend their networks, endpoints, cloud systems, and data from sophisticated attacks such as ransomware, phishing campaigns, insider threats, and advanced persistent threats. However, modern IT environments are highly complex, and security teams are often overwhelmed by thousands of alerts generated by different security…
-
Cybercrime-Netzwerk mit Millionen Fake-Accounts enttarnt
Tags: cyberattack, cybercrime, infrastructure, intelligence, okta, phishing, scam, service, threat, toolDie Threat-Intelligence von Okta hat ein weitverzweigtes Cybercrime-Netzwerk mit Sitz in Vietnam identifiziert, das die massenhafte Erstellung gefälschter Online-Konten ermöglicht. Die Accounts werden von Betrügern weltweit für Phishing, SMS-Pumping-Angriffe, Romance-Scams und andere Online-Betrugsformen genutzt. Das Netzwerk arbeitet nach dem Modell Cybercrime-as-a-Service (CaaS): Anbieter verkaufen Infrastruktur, Vorlagen und Tools, mit denen Kriminelle automatisiert Fake-Accounts erstellen oder…
-
Gefährliche Easter-Eggs im Postfach Phishingangriffe an Feiertagen
Die Osterfeiertage bedeuten für viele Unternehmen reduzierte Besetzung. Projektabschlüsse vor dem langen Wochenende, Abwesenheitsnotizen im E-Mail-Postfach und der gedankliche Wechsel in den Urlaubsmodus sorgen für eine veränderte Aufmerksamkeitsspanne. Genau diese Kombination nutzen Cyberkriminelle gezielt aus. Phishing-Kampagnen rund um Feiertage gehören seit Jahren zu den effektivsten Methoden, um Zugangsdaten abzugreifen oder Schadsoftware in Unternehmensnetze einzuschleusen. […]…
-
EU-Gutachten zu Phishing: Warum Banken Opfern ihr Geld immer sofort zurückzahlen sollen
Tags: phishingFirst seen on t3n.de Jump to article: t3n.de/news/eu-gutachten-zu-phishing-warum-banken-opfern-ihr-geld-immer-sofort-zurueckzahlen-sollen-1733015/
-
BeatBanker Trojan Spreads via Phishing, Deploys Crypto Miner and RAT on Targeted Devices
BeatBanker is a new Android malware campaign targeting users in Brazil, combining banking fraud, crypto”‘mining, and, in its latest wave, full device takeover via a RAT. It spreads almost entirely through phishing pages that mimic the Google Play Store and trick victims into installing weaponized APKs disguised as legitimate apps and updates. The operation starts…
-
Malvertising: Herbert Grönemeyer und Hasso Plattner werden missbraucht
Aktuell weltweite Kampagne mit russischem cyberkriminellem Hintergrund. 310 koordinierte Kampagnen für digitalen Betrug in 25 Ländern auf sechs Kontinenten. Phishing-Mails mit aggressivem telefonischem Nachsetzen. Fake-Anzeigen als Ausgangspunkt für Anlagenbetrug. Depot-Empfehlungen von Herbert Grönemeyer oder vermeintliche Krypto-Tipps von SAP”‘Gründer Hasso Plattner sind derzeit Teil einer groß angelegten internationalen Betrugskampagne. Dahinter steckt ein global agierendes Netzwerk… First…
-
Microsoft brings phishing-resistant Windows sign-ins via Entra passkeys
Microsoft is rolling out passkey support for Microsoft Entra on Windows devices, adding phishing-resistant passwordless authentication via Windows Hello. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-entra-brings-phishing-resistant-sign-in-to-windows/

