Tag: phishing
-
Preparing Healthcare Workers for Secure, Responsible AI Use
Preparing a healthcare workforce to responsibly engage with AI tools without over relying on automation or undermining human oversight will require awareness training akin to phishing exercises, said Skip Sorrels, field CTO and CISO at security firm Claroty. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/preparing-healthcare-workers-for-secure-responsible-ai-use-i-5510
-
Blind Eagle Hackers Target Government Agencies Using PowerShell Scripts
Tags: access, cyber, cyberattack, cybersecurity, email, government, group, hacker, phishing, powershell, spear-phishing, threatColombian government institutions are facing a sophisticated multi-stage cyberattack campaign orchestrated by the BlindEagle threat group, which leveraged compromised internal email accounts, PowerShell scripts, and steganography to deploy remote access trojans on target systems, according to Zscaler ThreatLabz researchers. The cybersecurity firm discovered the spear-phishing operation in early September 2025, revealing that BlindEagle targeted agencies…
-
Phishing-Hochsaison Weihnachten Bitdefender-Analyse zu ESpam
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/phishing-hochsaison-weihnachten-bitdefender-analyse-e-mail-spam
-
Phishing-Hochsaison Weihnachten Bitdefender-Analyse zu ESpam
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/phishing-hochsaison-weihnachten-bitdefender-analyse-e-mail-spam
-
Phishing-Hochsaison Weihnachten Bitdefender-Analyse zu ESpam
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/phishing-hochsaison-weihnachten-bitdefender-analyse-e-mail-spam
-
Top 10 CERT-In Empanelled Auditors in India in 2026
Organisations today are increasingly exposed to cyber risks originating from unchecked network scanning and unpatched vulnerabilities. At the same time, the rise of malicious large language models like WormGPT and FraudGPT has lowered the barrier for hackers, enabling even less-skilled actors to launch phishing campaigns, create malware, and exploit security gaps with alarming ease. For……
-
Phishing unter dem Weihnachtsbaum
Zwischen Geschenkbestellungen, spontanen Last-Minute-Käufen und saisonalen Rabattaktionen kann man schnell den Überblick verlieren. Eine Versandbestätigung hier, ein Paketstatus dort oder eine Rechnung von einem Onlineshop. Aber in welchem Shop wurde wirklich bestellt, und welche Mail ist doch nur ein Phishingangriff? Genau diese Flut an E-Mails nutzen Cyberkriminelle gezielt aus. First seen on it-daily.net Jump to…
-
Surge of OAuth Device Code Phishing Attacks Targets M365 Accounts
Financially motivated and nation-state threat groups are behind a surge in the use of device code phishing attacks that abuse Microsoft’s legitimate OAuth 2.0 device authorization grant flow to trick users into giving them access to their M365 accounts, Proofpoint researchers say. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/12/surge-of-oauth-device-code-phishing-attacks-targets-m365-accounts/
-
HubSpot Phishing Campaign Bypasses Trusted Email Defenses
A phishing campaign targeting HubSpot users bypassed email defenses by abusing trusted platforms and authenticated infrastructure. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/hubspot-phishing-campaign-bypasses-trusted-email-defenses/
-
Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers
Tags: attack, authentication, credentials, email, government, group, hacker, microsoft, phishing, russiaA suspected Russia-aligned group has been attributed to a phishing campaign that employs device code authentication workflows to steal victims’ Microsoft 365 credentials and conduct account takeover attacks.The activity, ongoing since September 2025, is being tracked by Proofpoint under the moniker UNK_AcademicFlare.The attacks involve using compromised email addresses belonging to government First seen on thehackernews.com…
-
Nigeria arrests dev of Microsoft 365 ‘Raccoon0365’ phishing platform
The Nigerian police have arrested three individuals linked to targeted Microsoft 365 cyberattacks via Raccoon0365 phishing-as-a-service. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/nigeria-arrests-dev-of-microsoft-365-raccoon0365-phishing-platform/
-
Nigeria arrests suspected RaccoonO365 phishing kit developer on tip from Microsoft, FBI
One of the alleged developers behind the RaccoonO365 subscription-based phishing kit was arrested by Nigerian police this week. First seen on therecord.media Jump to article: therecord.media/nigeria-raccoon-developer-tip
-
Microsoft 365 accounts targeted in wave of OAuth phishing attacks
Multiple threat actors are compromising Microsoft 365 accounts in phishing attacks that leverage the OAuth device code authorization mechanism. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-365-accounts-targeted-in-wave-of-oauth-phishing-attacks/
-
State-linked and criminal hackers use device code phishing against M365 users
Russia-linked groups have attacked multiple sectors in recent months. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/state-linked-criminal-hackers-device-code-phishing-m365/808396/
-
Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks
Authorities in Nigeria have announced the arrest of three “high-profile internet fraud suspects” who are alleged to have been involved in phishing attacks targeting major corporations, including the main developer behind the RaccoonO365 phishing-as-a-service (PhaaS) scheme.The Nigeria Police Force National Cybercrime Centre (NPFNCCC) said investigations conducted in collaboration with First seen on thehackernews.com Jump to…
-
Targeted Phishing Attack Strikes HubSpot Users
Evalian’s Security Operations Centre has uncovered an active, sophisticated phishing campaign targeting HubSpot customers, combining business email compromise (BEC) tactics with website compromise to distribute a credential-stealing malware to unsuspecting users. The multi-layered attack demonstrates how modern threat actors are evolving their techniques to bypass traditional email security controls. The phishing campaign employs a deceptive…
-
Beware of Malicious Scripts in Weaponized PDF Purchase Orders
A sophisticated phishing campaign utilizing a weaponized PDF document named “NEW Purchase Order # 52177236.pdf” has been identified, employing legitimate cloud infrastructure and encrypted messaging apps to steal corporate credentials. The attack vector was brought to light after security researchers analyzed a blocked link reported by a customer, revealing a complex chain of obfuscation designed…
-
APT35 Leak Reveals Spreadsheets Containing Domains, Payments, and Server Information
Iranian cyber unit Charming Kitten, officially designated APT35, has long been dismissed as a noisy but relatively unsophisticated threat actor a politically motivated collective known for recycled phishing templates and credential-harvesting pages. Episode 4, the latest intelligence dump, fundamentally rewrites that assessment. What emerges is not a hacker collective but a government department, complete with…
-
Beware of Malicious Scripts in Weaponized PDF Purchase Orders
A sophisticated phishing campaign utilizing a weaponized PDF document named “NEW Purchase Order # 52177236.pdf” has been identified, employing legitimate cloud infrastructure and encrypted messaging apps to steal corporate credentials. The attack vector was brought to light after security researchers analyzed a blocked link reported by a customer, revealing a complex chain of obfuscation designed…
-
WhatsApp accounts targeted in ‘GhostPairing’ attack
Defending WhatsApp: Users can check which devices are paired via WhatsApp via Settings > Linked Devices. A rogue device link will appear here. Despite having access to a user’s WhatsApp account, the attacker can’t revoke their device access, which must be initiated by the primary device. Another tip is to enable two-step PIN verification. This…
-
WhatsApp accounts targeted in ‘GhostPairing’ attack
Defending WhatsApp: Users can check which devices are paired via WhatsApp via Settings > Linked Devices. A rogue device link will appear here. Despite having access to a user’s WhatsApp account, the attacker can’t revoke their device access, which must be initiated by the primary device. Another tip is to enable two-step PIN verification. This…
-
OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365
A surge in phishing attacks exploiting Microsoft’s OAuth device code flow has been identified by Proofpoint First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/oauth-phishing-campaigns/
-
What the Latest OpenAI Security Breach Reveals About the State of AI Protection
A recent OpenAI-related breach via third-party provider Mixpanel exposes how AI supply chain vulnerabilities enable phishing, impersonation, and regulatory risk”, even without direct system compromise. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/12/what-the-latest-openai-security-breach-reveals-about-the-state-of-ai-protection/
-
What the Latest OpenAI Security Breach Reveals About the State of AI Protection
A recent OpenAI-related breach via third-party provider Mixpanel exposes how AI supply chain vulnerabilities enable phishing, impersonation, and regulatory risk”, even without direct system compromise. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/12/what-the-latest-openai-security-breach-reveals-about-the-state-of-ai-protection/
-
Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
Between June 2024 and December 2025, Fortra analysts tracked a persistent business email compromise (BEC) operation that we have now classified as Scripted Sparrow. The group … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/18/tracking-scripted-sparrow-phishing-campaigns/
-
Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
Between June 2024 and December 2025, Fortra analysts tracked a persistent business email compromise (BEC) operation that we have now classified as Scripted Sparrow. The group … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/18/tracking-scripted-sparrow-phishing-campaigns/
-
Microsoft 365 users targeted in device code phishing attacks
Attackers are targeting Microsoft 365 users with device code authorization phishing, a technique that fools users into approving access tokens, Proofpoint warns. The method … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/18/microsoft-365-device-code-phishing/

