Tag: phishing
-
Okta Flags Customised, Reactive Vishing Attacks Which Bypass MFA
Threat actors posing as IT support teams use phishing kits to generate fake login sites in real-time to trick victims into handing over credentials First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/okta-flags-vishing-attacks-which/
-
North Korealinked KONNI uses AI to build stealthy malware tooling
Check Point links an active phishing campaign to North Koreaaligned KONNI, targeting developers with fake blockchain project docs and using an AI-written PowerShell backdoor. Check Point Research uncovered an active phishing campaign attributed to the North Korealinked KONNI group (aka Kimsuky, Earth Imp, TA406, Thallium, Vedalia, and Velvet Chollima). The operation targets software developers and engineers using fake project…
-
Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers
Tags: ai, backdoor, blockchain, hacker, india, intelligence, korea, malware, north-korea, phishing, powershell, russia, threat, tool, ukraineThe North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence (AI) tools to target developers and engineering teams in the blockchain sector.The phishing campaign has targeted Japan, Australia, and India, highlighting the adversary’s expansion of the targeting scope beyond South Korea, Russia, Ukraine, and European nations, Check…
-
1Password adds pop-up warnings for suspected phishing sites
The 1Password digital vault and password manager has added built-in protection against phishing URLs to help users identify malicious pages and prevent them from sharing account credentials with threat actors. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/1password-adds-pop-up-warnings-for-suspected-phishing-sites/
-
1Password adds pop-pup warnings for suspected phishing sites
The 1Password digital vault and password manager has added built-in protection against phishing URLs to help users identify malicious pages and prevent them from sharing account credentials with threat actors. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/1password-adds-pop-pup-warnings-for-suspected-phishing-sites/
-
1Password gegen Phishing: Warum ihr schon bald einen neuen Warnhinweis seht
Tags: phishingFirst seen on t3n.de Jump to article: t3n.de/news/1password-warnhinweis-gegen-phishing-1726548/
-
Trade Republic: Nutzer werden mit Phishing-Mails in die Falle gelockt so schützt ihr euch
First seen on t3n.de Jump to article: t3n.de/news/trade-republic-phishing-mails-1726527/
-
Trade Republic: Nutzer werden mit Phishing-Mails in die Falle gelockt so schützt ihr euch
First seen on t3n.de Jump to article: t3n.de/news/trade-republic-phishing-mails-1726527/
-
ShinyHunters claim hacks of Okta, Microsoft SSO accounts for data theft
The ShinyHunters extortion gang claims it is behind a wave of ongoing voice phishing attacks targeting single sign-on (SSO) accounts at Okta, Microsoft, and Google, enabling threat actors to breach corporate SaaS platforms and steal company data for extortion. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/shinyhunters-claim-to-be-behind-sso-account-data-theft-attacks/
-
Researchers Uncover Multi-Stage AiTM Attack Using SharePoint to Bypass Security Controls
Microsoft Defender researchers have exposed a sophisticated adversary-in-the-middle (AiTM) phishing campaign targeting energy sector organizations, leveraging SharePoint file-sharing services to bypass traditional email security controls and compromise multiple user accounts. SharePoint Abuse for Initial Access The attack began with a phishing email sent from a compromised trusted vendor’s email address, embedding SharePoint URLs that mimicked…
-
ShinyHunters claim to be behind SSO-account data theft attacks
The ShinyHunters extortion gang claims it is behind a wave of ongoing voice phishing attacks targeting single sign-on (SSO) accounts at Okta, Microsoft, and Google, enabling threat actors to breach corporate SaaS platforms and steal company data for extortion. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/shinyhunters-claim-to-be-behind-sso-account-data-theft-attacks/
-
Voice Phishing Okta Customers: ShinyHunters Claims Credit
Okta Alerts Customers’ CISOs to Malicious Campaigns Seeking Single Sign-On Access. A surge in attacks that bypass some types of multifactor authentication has been tied to a new generation of voice-phishing toolkits that give attackers the ability to orchestrate what a target sees in their browser, warns a new report from Okta, which is among…
-
Critical Vulnerabilities and Phishing Campaigns Dominate Cybersecurity Headlines
Weekly summary of Cybersecurity Insider newsletters First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/weekly-roundup/critical-vulnerabilities-and-phishing-campaigns-dominate-cybersecurity-headlines/
-
Okta Uncovers Custom Phishing Kits Built for Vishing Callers
They can intercept user credentials while providing real-time context that helps attackers convince victims to approve MFA challenges during phone calls.. The post Okta Uncovers Custom Phishing Kits Built for Vishing Callers appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-phishing-kits-vishing-callers/
-
Okta Uncovers Custom Phishing Kits Built for Vishing Callers
They can intercept user credentials while providing real-time context that helps attackers convince victims to approve MFA challenges during phone calls.. The post Okta Uncovers Custom Phishing Kits Built for Vishing Callers appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-phishing-kits-vishing-callers/
-
The 2025 Phishing Surge Proved One Thing: Chasing Doesn’t Work
Tags: phishing<div cla Let’s get something out of the way: retrospectives can feel a bit like mandatory fun. Someone gathers up the year’s events, packages them into neat categories, and delivers “key takeaways” that land somewhere between obvious and forgettable. This is not that. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/the-2025-phishing-surge-proved-one-thing-chasing-doesnt-work/
-
Okta users under attack: Modern phishing kits are turbocharging vishing attacks
Threat actors who specialize in vishing (i.e., voice phishing) have started using phishing kits that can intercept targets’ login credentials while also allowing … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/23/okta-vishing-adaptable-phishing-kits/
-
Unterschätztes Risiko: Insider-Bedrohungen endlich ernst nehmen
Tags: access, ai, compliance, cyberattack, cybersecurity, data, fraud, governance, identity, infrastructure, mail, nis-2, phishing, resilience, risk, risk-analysis, risk-management, security-incident, threat, tool, vulnerability48 Prozent der Fälle von Datendiebstahl, Industriespionage oder Sabotage in Unternehmen gehen laut einer Studie auf Mitarbeiter zurück.Was wäre, wenn das größte Sicherheitsrisiko Ihrer Organisation bereits einen Mitarbeitendenausweis besitzt, legitim angemeldet ist und genau weiß, wie interne Prozesse funktionieren? Diese Frage ist unbequem, aber sie markiert den Ausgangspunkt für eine längst überfällige Auseinandersetzung mit Insider-Bedrohungen.…
-
1Password targets AI-driven phishing with built-in prevention
To help reduce phishing risk, 1Password added an extra layer of protection and began rolling out a phishing prevention feature designed to stop users before they share … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/23/1password-phishing-prevention-feature/
-
Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
Tags: access, attack, breach, credentials, cybersecurity, monitoring, phishing, software, threat, toolCybersecurity researchers have disclosed details of a new dual-vector campaign that leverages stolen credentials to deploy legitimate Remote Monitoring and Management (RMM) software for persistent remote access to compromised hosts.”Instead of deploying custom viruses, attackers are bypassing security perimeters by weaponizing the necessary IT tools that administrators trust,” KnowBe4 Threat First seen on thehackernews.com Jump…
-
Manage My Health Data Breach Sparks Warnings Over Impersonation and Phishing Attempts
The fallout from the Manage My Health data breach is continuing, with the company warning that fraudsters may now be attempting to contact affected users by impersonating the online patient portal. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/manage-my-health-data-breach-phishing/
-
Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
Microsoft has warned of a multi”‘stage adversary”‘in”‘the”‘middle (AitM) phishing and business email compromise (BEC) campaign targeting multiple organizations in the energy sector.”The campaign abused SharePoint file”‘sharing services to deliver phishing payloads and relied on inbox rule creation to maintain persistence and evade user awareness,” the Microsoft Defender Security Research Team said. First seen on thehackernews.com…
-
Ransomware gang’s slip-up led to data recovery for 12 US firms
Tags: access, attack, backup, breach, business, citrix, cloud, corporate, cyber, data, data-breach, detection, encryption, endpoint, exploit, finance, group, incident response, infosec, infrastructure, law, linux, network, phishing, powershell, ransom, ransomware, risk, software, spear-phishing, sql, threat, tool, veeam, vulnerabilityscrutinize and audit your backups. If you have a regular backup schedule, is there unexpected or unexplained activity? Von Ramin Mapp notes that crooks are known to time data exfiltration to match corporate off-site backups as a way to hide their work;monitor for encrypted data leaving your environments and see where it goes. Does this…
-
Breach Roundup: DOGE Uploaded Social Security Data to Cloud
Also, CIRO Phishing Breach, Ingram Micro Ransomware and CVE Surge. This week, DOGE posted sensitive data on an outside server. A phishing attack affected 750,000 Canadians. A hacktivism warning from the U.K. NCSC. An Ingram Micro breach. CVEs surged in 2025. SK Telecom challenged a fine. Researchers disclosed Chainlit flaws. North Korean hackers abused VS…
-
Crims compromised energy firms’ Microsoft accounts, sent 600 phishing emails
Logging in, not breaking in First seen on theregister.com Jump to article: www.theregister.com/2026/01/22/crims_compromised_energy_firms_microsoft/

