Tag: phishing
-
Phishing im Namen von Lufthansa, Emirates und Co.
Sicherheitsforscher von Kaspersky warnen vor einer aktuellen Betrugsserie, die sich gezielt gegen Unternehmen richtet. Dabei geben sich Angreifer in E-Mails als renommierte Airlines oder Flughäfen aus, darunter Lufthansa, Emirates, Qatar Airways, Etihad oder der Flughafen Amsterdam Schiphol. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/phishing-lufthansa-emirates-und-co
-
Phishing im Namen von Lufthansa, Emirates und Co.
Sicherheitsforscher von Kaspersky warnen vor einer aktuellen Betrugsserie, die sich gezielt gegen Unternehmen richtet. Dabei geben sich Angreifer in E-Mails als renommierte Airlines oder Flughäfen aus, darunter Lufthansa, Emirates, Qatar Airways, Etihad oder der Flughafen Amsterdam Schiphol. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/phishing-lufthansa-emirates-und-co
-
175 npm Packages Abused in Beamglea Phishing Operation
The Beamglea campaign used 175 malicious npm packages to host phishing redirects, targeting global tech and energy firms. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/npm-packages-abused-beamglea/
-
“Payroll Pirate” phishing scam that takes over Workday accounts steals paychecks
Among other things, the scammers bypass multi-factor authentication. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/10/payroll-pirate-phishing-scam-that-takes-over-workday-accounts-steals-paychecks/
-
Microsoft warns of ‘payroll pirate’ crew looting US university salaries
Crooks phish campus staff, slip into HR systems, and quietly reroute paychecks First seen on theregister.com Jump to article: www.theregister.com/2025/10/10/microsoft_payroll_pirate/
-
Microsoft warns of ‘payroll pirate’ crew looting US university salaries
Crooks phish campus staff, slip into HR systems, and quietly reroute paychecks First seen on theregister.com Jump to article: www.theregister.com/2025/10/10/microsoft_payroll_pirate/
-
Ukraine sees surge in AI-Powered cyberattacks by Russia-linked Threat Actors
Russia-linked actors use AI to craft phishing and malware attacks against entities in Ukraine, says SSSCIP. Russian hackers increasingly use AI in cyberattacks against Ukraine, the country’s State Service for Special Communications and Information Protection (SSSCIP) reported. Beyond AI-generated phishing, some malware samples now show AI-generated code. In H1 2025, Ukraine recorded 3,018 cyber incidents,…
-
Ukraine sees surge in AI-Powered cyberattacks by Russia-linked Threat Actors
Russia-linked actors use AI to craft phishing and malware attacks against entities in Ukraine, says SSSCIP. Russian hackers increasingly use AI in cyberattacks against Ukraine, the country’s State Service for Special Communications and Information Protection (SSSCIP) reported. Beyond AI-generated phishing, some malware samples now show AI-generated code. In H1 2025, Ukraine recorded 3,018 cyber incidents,…
-
Report für Q2 2025 – Cisco warnt vor Phishing durch Kollegen
First seen on security-insider.de Jump to article: www.security-insider.de/cisco-talos-report-phishing-attacken-kollegen-konten-a-182ef6c18d3f61c59a94721e7fc48604/
-
175 Malicious npm Packages Targeting Tech and Energy Firms, 26,000 Downloads
Socket’s Threat Research Team has uncovered a sprawling phishing campaign”, dubbed “Beamglea””, leveraging 175 malicious npm packages that have amassed over 26,000 downloads. These packages serve solely as hosting infrastructure, redirecting victims to credential-harvesting pages. Though randomly named packages make accidental developer installation unlikely, the download counts reflect security researchers, automated scanners, and CDN providers…
-
175 Malicious npm Packages Targeting Tech and Energy Firms, 26,000 Downloads
Socket’s Threat Research Team has uncovered a sprawling phishing campaign”, dubbed “Beamglea””, leveraging 175 malicious npm packages that have amassed over 26,000 downloads. These packages serve solely as hosting infrastructure, redirecting victims to credential-harvesting pages. Though randomly named packages make accidental developer installation unlikely, the download counts reflect security researchers, automated scanners, and CDN providers…
-
175 Malicious npm Packages Targeting Tech and Energy Firms, 26,000 Downloads
Socket’s Threat Research Team has uncovered a sprawling phishing campaign”, dubbed “Beamglea””, leveraging 175 malicious npm packages that have amassed over 26,000 downloads. These packages serve solely as hosting infrastructure, redirecting victims to credential-harvesting pages. Though randomly named packages make accidental developer installation unlikely, the download counts reflect security researchers, automated scanners, and CDN providers…
-
175 Malicious npm Packages Targeting Tech and Energy Firms, 26,000 Downloads
Socket’s Threat Research Team has uncovered a sprawling phishing campaign”, dubbed “Beamglea””, leveraging 175 malicious npm packages that have amassed over 26,000 downloads. These packages serve solely as hosting infrastructure, redirecting victims to credential-harvesting pages. Though randomly named packages make accidental developer installation unlikely, the download counts reflect security researchers, automated scanners, and CDN providers…
-
175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign
Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to facilitate credential harvesting attacks as part of an unusual campaign.The packages have been collectively downloaded 26,000 times, acting as an infrastructure for a widespread phishing campaign codenamed Beamglea targeting more than 135 industrial, technology, and…
-
175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign
Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to facilitate credential harvesting attacks as part of an unusual campaign.The packages have been collectively downloaded 26,000 times, acting as an infrastructure for a widespread phishing campaign codenamed Beamglea targeting more than 135 industrial, technology, and…
-
The Rise of AI-Powered Phishing How to Spot New Attacks
In today’s digital age, cybercriminals are leveraging AI to craft more convincing phishing scams. Recently, I encountered a sophisticated phishing attempt that underscores the growing threat of AI-powered fraud. Here’s what you need to know to protect yourself. The phishing email I received included detailed information about my career, likely scraped from my LinkedIn profile…
-
The Rise of AI-Powered Phishing How to Spot New Attacks
In today’s digital age, cybercriminals are leveraging AI to craft more convincing phishing scams. Recently, I encountered a sophisticated phishing attempt that underscores the growing threat of AI-powered fraud. Here’s what you need to know to protect yourself. The phishing email I received included detailed information about my career, likely scraped from my LinkedIn profile…
-
Hackers Exploit Microsoft Employee Accounts in Salary Theft Scheme
Tags: attack, authentication, credentials, cyber, exploit, finance, hacker, intelligence, microsoft, phishing, theft, threatMicrosoft Threat Intelligence is sounding the alarm on a surge of sophisticated “payroll pirate” attacks, in which financially motivated adversaries hijack employee accounts to reroute salary payments to attacker-controlled bank accounts. In the first half of 2025, Storm-2657 launched a widespread phishing campaign against university staff, harvesting credentials and multifactor authentication (MFA) codes. Attackers deployed…
-
Hackers Exploit Microsoft Employee Accounts in Salary Theft Scheme
Tags: attack, authentication, credentials, cyber, exploit, finance, hacker, intelligence, microsoft, phishing, theft, threatMicrosoft Threat Intelligence is sounding the alarm on a surge of sophisticated “payroll pirate” attacks, in which financially motivated adversaries hijack employee accounts to reroute salary payments to attacker-controlled bank accounts. In the first half of 2025, Storm-2657 launched a widespread phishing campaign against university staff, harvesting credentials and multifactor authentication (MFA) codes. Attackers deployed…
-
Hackers Exploit Microsoft Employee Accounts in Salary Theft Scheme
Tags: attack, authentication, credentials, cyber, exploit, finance, hacker, intelligence, microsoft, phishing, theft, threatMicrosoft Threat Intelligence is sounding the alarm on a surge of sophisticated “payroll pirate” attacks, in which financially motivated adversaries hijack employee accounts to reroute salary payments to attacker-controlled bank accounts. In the first half of 2025, Storm-2657 launched a widespread phishing campaign against university staff, harvesting credentials and multifactor authentication (MFA) codes. Attackers deployed…
-
ClayRat campaign uses Telegram and phishing sites to distribute Android spyware
ClayRat Android spyware targets Russian users via fake Telegram channels and phishing sites posing as popular apps like WhatsApp and YouTube. The ClayRat Android spyware campaign targets Russian users via fake Telegram channels and phishing sites posing as popular apps like Google Photos, WhatsApp, TikTok, YouTube. Zimperium named the spyware ClayRat after its C2 server,…
-
ClayRat campaign uses Telegram and phishing sites to distribute Android spyware
ClayRat Android spyware targets Russian users via fake Telegram channels and phishing sites posing as popular apps like WhatsApp and YouTube. The ClayRat Android spyware campaign targets Russian users via fake Telegram channels and phishing sites posing as popular apps like Google Photos, WhatsApp, TikTok, YouTube. Zimperium named the spyware ClayRat after its C2 server,…
-
‘Payroll pirate’ hackers diverting salary payments from university employees, Microsoft says
A phishing campaign is gaining access to universities’ third-party platforms and routing employee paychecks to accounts controlled by hackers, researchers said. First seen on therecord.media Jump to article: therecord.media/universities-phishing-payroll-pirates
-
From HealthKick to GOVERSHELL: The Evolution of UTA0388’s Espionage Malware
A China-aligned threat actor codenamed UTA0388 has been attributed to a series of spear-phishing campaigns targeting North America, Asia, and Europe that are designed to deliver a Go-based implant known as GOVERSHELL.”The initially observed campaigns were tailored to the targets, and the messages purported to be sent by senior researchers and analysts from legitimate-sounding, completely…
-
New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps
A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and lookalike phishing websites by impersonating popular apps like WhatsApp, Google Photos, TikTok, and YouTube as lures to install them.”Once active, the spyware can exfiltrate SMS messages, call logs, notifications, and device information; taking photos with…
-
ClayRat spyware turns phones into distribution hubs via SMS and Telegram
Fighting a self-spreading spyware: Experts say combating ClayRat requires both technical hardening and behavioral hygiene.”Security teams should enforce a layered mobile security posture that reduces installation paths, detects compromise, and limits blast radius,” said Jason Soroko, Senior Fellow at Sectigo. He recommends blocking sideloading through Android Enterprise policy, deploying mobile threat defense integrated with endpoint…
-
Homeland Security’s reassignment of CISA staff leaves US networks exposed
Tags: breach, cisa, data-breach, detection, exploit, flaw, governance, group, identity, intelligence, mfa, network, phishing, updateWake-up call for enterprises: The current situation acts as a wake-up call for enterprises. CISA may not be able to actively engage in issuing alerts and advisories, given its lack of resources.Organizations, therefore, cannot afford to wait for official confirmation on every new vulnerability. Acting on credible intelligence, within clear governance limits, can prevent a…
-
Homeland Security’s reassignment of CISA staff leaves US networks exposed
Tags: breach, cisa, data-breach, detection, exploit, flaw, governance, group, identity, intelligence, mfa, network, phishing, updateWake-up call for enterprises: The current situation acts as a wake-up call for enterprises. CISA may not be able to actively engage in issuing alerts and advisories, given its lack of resources.Organizations, therefore, cannot afford to wait for official confirmation on every new vulnerability. Acting on credible intelligence, within clear governance limits, can prevent a…
-
Homeland Security’s reassignment of CISA staff leaves US networks exposed
Tags: breach, cisa, data-breach, detection, exploit, flaw, governance, group, identity, intelligence, mfa, network, phishing, updateWake-up call for enterprises: The current situation acts as a wake-up call for enterprises. CISA may not be able to actively engage in issuing alerts and advisories, given its lack of resources.Organizations, therefore, cannot afford to wait for official confirmation on every new vulnerability. Acting on credible intelligence, within clear governance limits, can prevent a…
-
Your cyber risk problem isn’t tech, it’s architecture
Tags: ai, attack, awareness, best-practice, business, ciso, cloud, compliance, container, control, csf, cyber, cybersecurity, data, data-breach, defense, finance, framework, GDPR, governance, grc, group, intelligence, Internet, ISO-27001, mitre, nist, PCI, phishing, privacy, ransomware, regulation, risk, risk-assessment, risk-management, software, strategy, threat, training, update, vulnerabilityIf the company already has a mature risk culture: The implementation of a cybersecurity management project becomes more flexible. Since my goal is to share the mechanics to achieve success in a cybersecurity program, I emphasize below some components of this ‘recipe’ to consider: Understand the dynamics and scope of the business, mapping stakeholders, processes…

