Tag: phishing
-
Phishing Is Moving From Email to Mobile. Is Your Security?
With SMS, voice, and QR-code phishing incidents on the rise, it’s time to take a closer look at securing the mobile user. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/phishing-moving-email-mobile-is-your-security
-
Die Shopping-Aktionstage von Amazon werden bereits von Phishing-Mails und hunderten bösartigen Domains überschattet.
Check Point Software Technologies hat im Vorfeld des kommenden Amazon-Prime-Day am 7. und 8. Oktober Phishing-Betrügereien, gefälschte Domains und bösartige E-Mails im Zusammenhang mit den Shopping-Aktionstagen beobachtet. Der mehrmals im Jahr von Amazon ausgerufene Prime-Day bietet Prime-Kunden zahlreiche Exklusiv-Angebote und wird wegen seiner Popularität von Cyberkriminellen regelmäßig für neue Angriffswinkel und Betrugsmaschen ausgenutzt. Ziel ist…
-
Malicious ZIP Files Use Windows Shortcuts to Drop Malware
Cybersecurity firm Blackpoint Cyber reveals a new spear phishing campaign targeting executives. Learn how attackers use fraudulent document ZIPs containing malicious shortcut files, leveraging ‘living off the land’ tactics, and a unique Anti-Virus check to deliver a custom payload First seen on hackread.com Jump to article: hackread.com/malicious-zip-files-windows-shortcuts-malware/
-
Phishing Dominates EU-Wide Intrusions, says ENISA
ENISA reveals phishing and vulnerability exploitation accounted for majority of intrusions in past year First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/phishing-dominates-euwide/
-
That annoying SMS phish you just got may have come from a box like this
Smishers looking for new infrastructure are getting creative. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/10/that-annoying-sms-phish-you-just-got-may-have-come-from-a-box-like-this/
-
Fake Google Careers Recruiters Target Gmail Users in Phishing Scam
Phishing emails posing as Google recruiters steal Gmail logins, exploiting Salesforce spoofing and Cloudflare to bypass defenses. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/google-careers-phishing-scheme/
-
New MatrixPDF toolkit turns PDFs into phishing and malware lures
A new phishing and malware distribution toolkit called MatrixPDF allows attackers to convert ordinary PDF files into interactive lures that bypass email security and redirect victims to credential theft or malware downloads. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-matrixpdf-toolkit-turns-pdfs-into-phishing-and-malware-lures/
-
Smishing Campaigns Exploit Cellular Routers to Target Belgium
New smishing attacks exploit Milesight routers to send phishing texts targeting Belgian users First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/smishing-exploit-cellular-routers/
-
New Smish: New York Department of Revenue
As I was visiting SmishTank to report the most recent SMish that I had received (an iMessage from a +27 South African telephone number claiming to be from ParkMobile) I noticed there had been many recent submissions from the New York Department of Revenue. SmishTank is operated by Professor Muhammad Lutfor Rahman, a colleague of mine…
-
Hackers Posing as Google Careers Recruiter to Steal Gmail Login Details
An emerging phishing campaign is targeting job seekers by masquerading as Google Careers recruiters, delivering seemingly legitimate emails that lead victims to malicious sites designed to harvest Gmail credentials. Security researchers have uncovered a sophisticated multi-stage attack that leverages Salesforce infrastructure, Cloudflare protection and WebSocket command-and-control to manipulate victims into surrendering sensitive information. The phishing…
-
Generation Z führt die Liste der Opfer von Phishing-Angriffen an
Angesichts der wachsenden Unsicherheit im Zusammenhang mit künstlicher Intelligenz (KI) und der zunehmenden Zahl von Cybersicherheits-verletzungen hat Yubico, der führende Anbieter von Hardware-Authentifizierungssicherheitsschlüsseln, pünktlich zum Cybersecurity-Awareness-Month im Oktober die Ergebnisse seiner jährlichen Umfrage zum globalen Stand der Authentifizierung veröffentlicht. Die von Yubico in Auftrag gegebene und von Talker Research durchgeführte Umfrage sammelte Erkenntnisse von 18.000…
-
Generation Z führt die Liste der Opfer von Phishing-Angriffen an
Angesichts der wachsenden Unsicherheit im Zusammenhang mit künstlicher Intelligenz (KI) und der zunehmenden Zahl von Cybersicherheits-verletzungen hat Yubico, der führende Anbieter von Hardware-Authentifizierungssicherheitsschlüsseln, pünktlich zum Cybersecurity-Awareness-Month im Oktober die Ergebnisse seiner jährlichen Umfrage zum globalen Stand der Authentifizierung veröffentlicht. Die von Yubico in Auftrag gegebene und von Talker Research durchgeführte Umfrage sammelte Erkenntnisse von 18.000…
-
Microsoft Flags AI Phishing Attack Hiding in SVG Files
Microsoft Threat Intelligence detected a new AI-powered phishing campaign using LLMs to hide malicious code inside SVG files disguised as business dashboards. First seen on hackread.com Jump to article: hackread.com/microsoft-ai-phishing-attack-hiding-svg-files/
-
When ‘Oprah’ Smished Me: Smishing and AI-Driven Phishing Risks
An “Oprah” smishing scam shows how AI makes phishing smarter. Learn how to spot, stop, and protect yourself from evolving mobile threats. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/smished-by-oprah/
-
When ‘Oprah’ Smished Me: Smishing and AI-Driven Phishing Risks
An “Oprah” smishing scam shows how AI makes phishing smarter. Learn how to spot, stop, and protect yourself from evolving mobile threats. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/smished-by-oprah/
-
Microsoft Flags AI Phishing Attack Hiding in SVG Files
Microsoft Threat Intelligence detected a new AI-powered phishing campaign using LLMs to hide malicious code inside SVG files disguised as business dashboards. First seen on hackread.com Jump to article: hackread.com/microsoft-ai-phishing-attack-hiding-svg-files/
-
APT35 Hackers Targeting Government and Military to Steal Login Credentials
Tags: credentials, cyber, government, hacker, intelligence, login, malicious, military, phishing, threatStormshield CTI researchers have identified two active phishing servers linked to APT35, revealing ongoing credential-stealing operations targeting government and military entities. In an active threat-hunting operation, Stormshield’s Cyber Threat Intelligence (CTI) team discovered two malicious servers exhibiting hallmark characteristics of APT35 infrastructure. These servers, mirroring footprints documented by Check Point, are hosting phishing pages designed…
-
Ongoing APT35 Phishing Campaign Uncovered: Iranian Group Impersonates Video Conferencing Services
The post Ongoing APT35 Phishing Campaign Uncovered: Iranian Group Impersonates Video Conferencing Services appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/ongoing-apt35-phishing-campaign-uncovered-iranian-group-impersonates-video-conferencing-services/
-
Microsoft Sniffs Out AI-Based Phishing Campaign Using Its AI-Based Tools
Microsoft used AI-based tools in Defender for Office 365 to detect and block a phishing campaign in which Security Copilot determined the malicious code was likely written by a LLM, marking the latest incident in which AI security tools were used to combat an AI-based cyberattack. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/microsoft-sniffs-out-ai-based-phishing-campaign-using-its-ai-based-tools/
-
Ukrainian Cops Spoofed in Fileless Phishing Attacks on Kyiv
Attackers impersonate the National Police of Ukraine to deploy Amatera Stealer and PureMiner, using malicious Scalable Vector Graphics to trick victims. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/ukrainian-cops-spoofed-fileless-phishing-attacks-kyiv
-
AI-Generated Code Used in Phishing Campaign Blocked by Microsoft
Microsoft Threat Intelligence stopped an AI-driven credential phishing campaign using SVG files disguised as PDFs First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ai-generated-code-phishing/
-
New Spear-Phishing Attack Deploys DarkCloud Malware to Steal Keystrokes and Credentials
Tags: attack, credentials, cyber, detection, intelligence, malware, phishing, soc, spear-phishing, threatAdversaries don’t work 95 and neither do we. At eSentire, our 24/7 SOCs are staffed with elite threat hunters and cyber analysts who hunt, investigate, contain and respond to threats within minutes. Backed by threat intelligence, tactical threat response and advanced threat analytics from our Threat Response Unit (TRU), eSentire delivers rapid detection and disruption…
-
Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email Security
Microsoft is calling attention to a new phishing campaign primarily aimed at U.S.-based organizations that has likely utilized code generated using large language models (LLMs) to obfuscate payloads and evade security defenses.”Appearing to be aided by a large language model (LLM), the activity obfuscated its behavior within an SVG file, leveraging business terminology and a…
-
SMS Pools and what the US Secret Service Really Found Around New York
Tags: apple, authentication, business, china, conference, control, country, credit-card, crime, crypto, data, email, exploit, finance, fraud, google, group, Hardware, infrastructure, iphone, jobs, korea, law, linux, mfa, mobile, phishing, phone, scam, service, smishing, software, theft, usa, windowsLast week the United Nations General Assembly kicked off in New York City. On the first day, a strange US Secret Service press conference revealed that they had seized 300 SIM Servers with 100,000 SIM cards. Various media outlets jumped on the idea that this was some state-sponsored sleeper cell waiting to destroy telecommunication services…
-
Agentic AI in IT security: Where expectations meet reality
Tags: ai, api, automation, cloud, compliance, control, credentials, crowdstrike, cybersecurity, data, detection, finance, framework, gartner, google, governance, infrastructure, injection, metric, phishing, RedTeam, risk, service, siem, skills, soar, soc, software, strategy, technology, threat, tool, trainingIntegration approaches: Add-on vs. standalone: The first decision regarding AI agents is whether to layer them onto existing platforms or to implement standalone frameworks. The add-on model treats agents as extensions to security information and event management (SIEM), security orchestration, automation and response (SOAR), or other security tools, providing quick wins with minimal disruption. Standalone…
-
Agentic AI in IT security: Where expectations meet reality
Tags: ai, api, automation, cloud, compliance, control, credentials, crowdstrike, cybersecurity, data, detection, finance, framework, gartner, google, governance, infrastructure, injection, metric, phishing, RedTeam, risk, service, siem, skills, soar, soc, software, strategy, technology, threat, tool, trainingIntegration approaches: Add-on vs. standalone: The first decision regarding AI agents is whether to layer them onto existing platforms or to implement standalone frameworks. The add-on model treats agents as extensions to security information and event management (SIEM), security orchestration, automation and response (SOAR), or other security tools, providing quick wins with minimal disruption. Standalone…
-
Junge Onliner tappen oft in Phishing-Fallen
Laut einer Umfrage fällt die jüngere Generation leichter auf Phishing herein.Obwohl sie digital versierter sind als jede andere Generation, fallen auch jüngere Onliner die sogenannten Digital Natives vergleichsweise leicht auf Betrugsmaschen im Netz herein. Fast die Hälfte der Gen Z, wie die Jahrgänge von 1997 bis 2012 genannt werden, erkennt typische Phishing-Warnsignale wie ungefragt zugesandte…
-
How attackers poison AI tools and defenses
Cyberattackers are using generative AI to draft polished spam, create malicious code and write persuasive phishing lures. They are also learning how to turn AI systems … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/29/poisoned-ai-prompt/
-
SVG Files Abused to Deploy PureMiner Malware and Exfiltrate Data
Cybercriminals are exploiting SVG files as an initial attack vector in a multi-stage campaign designed to impersonate Ukrainian government communications. FortiGuard Labs has uncovered a sophisticated phishing campaign targeting Ukrainian government agencies through malicious Scalable Vector Graphics (SVG) files, ultimately deploying both cryptocurrency mining malware and information stealers to compromise victim systems. The attack begins…

