Tag: phishing
-
New Phishing Campaign Abuses ConnectWise ScreenConnect to Take Over Devices
Abnormal AI said the campaign, which lures victims into downloading legitimate RMM software, marks a major evolution in phishing tactics First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/phishing-abuses-connectwise-take/
-
TDL003 – Breaking Barriers: IPv6 Adoption and DNS Transformation with Tommy Jensen
Tags: access, ai, apple, attack, backup, banking, browser, business, ceo, chrome, ciso, compliance, computer, computing, control, country, credentials, cybersecurity, data, data-breach, ddos, dns, encryption, endpoint, google, government, group, international, Internet, jobs, law, microsoft, mobile, network, phishing, phone, privacy, programming, radius, risk, service, smishing, strategy, switch, technology, threat, update, vpn, windows, zero-trustSummary This episode of the Defender’s Log features special guest Tommy Jensen, an internet technologist specializing in IPv6, Zero Trust, and standards. Jensen’s career path, from an AppleCare contractor to a key figure in advancing internet technologies, is explored. The discussion highlights the critical importance and challenges of migrating to IPv6 and the necessity of…
-
New ZipLine Campaign Targets Critical Manufacturing Firms with In-Memory MixShell Malware
Check Point Research has uncovered a highly persistent phishing operation dubbed ZipLine, which reverses traditional attack vectors by exploiting victims’ own >>Contact Us
-
Warning for Windows Users: Global UpCrypter Phishing Attack is Expanding
Hackers are using fake voicemails and purchase orders to spread UpCrypter malware, giving them remote control over Windows systems worldwide. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-upcrypter-phishing-microsoft-windows/
-
Sicherheitsrisiken bei Microsoft-365 Manipulation von E-Mail-Regeln, Formularen und Konnektoren
Viele IT- und Sicherheitsverantwortliche denken beim Thema E-Mail-Sicherheit vor allem an Phishing und ähnliche Gefahren in Verbindung mit dem Diebstahl von Zugangsdaten durch Cyberkriminelle. Aber zunehmend rücken auch bislang weniger beachtete Funktionen von E-Mail-Software wie Outlook in den Fokus der Diskussion: E-Mail-Regeln, Formulare und Mailfluss-Konnektoren können manipuliert werden und bergen ein ernstzunehmendes Risiko für Unternehmen,…
-
Phishing Campaign Uses UpCrypter to Deploy Remote Access Tools
A global phishing campaign has been identified using personalized emails and fake websites to deliver malware via UpCrypter First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/phishing-upcrypter-deploy-rat/
-
The Enterprise Risk of OAuth Device Flow Vulnerabilities And How SSOJet Solves It
SSOJet delivers far more than “just SSO”: we give your team the visibility, control, and security intelligence needed to defeat device flow phishing and build a future-proof identity management framework. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/08/the-enterprise-risk-of-oauth-device-flow-vulnerabilities-and-how-ssojet-solves-it/
-
ThreatActors Leverage Google Classroom to Target 13,500 Organizations
Google Classroom, a popular educational platform, has been exploited by threat actors to launch a major phishing campaign in a complex operation discovered by Check Point researchers. Over a single week from August 6 to August 12, 2025, attackers disseminated more than 115,000 malicious emails across five coordinated waves, targeting approximately 13,500 organizations globally. These…
-
Fast-Spreading, Complex Phishing Campaign Installs RATs
Attackers not only steal credentials but also can maintain long-term, persistent access to corporate networks through the global campaign. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/fast-spreading-phishing-installs-rats
-
Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads
Cybersecurity researchers have flagged a new phishing campaign that’s using fake voicemails and purchase orders to deliver a malware loader called UpCrypter.The campaign leverages “carefully crafted emails to deliver malicious URLs linked to convincing phishing pages,” Fortinet FortiGuard Labs researcher Cara Lin said. “These pages are designed to entice recipients into downloading JavaScript First seen…
-
Fake Voicemail Emails Install UpCrypter Malware on Windows
FortiGuard Labs warns of a global phishing campaign that delivers UpCrypter malware, giving hackers complete control of infected… First seen on hackread.com Jump to article: hackread.com/fake-voicemail-emails-install-upcrypter-malware-windows/
-
2025 CSO Hall of Fame: Meg Anderson on AI, strategic security investments, and life after InfoSec
Tags: ai, automation, business, ciso, conference, cyber, cybersecurity, finance, infosec, jobs, metric, phishing, programming, risk, risk-management, software, strategy, technology, threat, toolWhich technologies are you most cautious about from a CISO’s point of view, and why?: Meg Anderson: I’m cautious of “solutions” that don’t solve a strategic problem. CISOs only have so much budget and mindshare. You need to understand where a tool fits in your investment and strategic roadmap. There were times when my team…
-
Credential harvesting campaign targets ScreenConnect cloud administrators
Researchers warn that attackers are using compromised Amazon email accounts in spear-phishing attacks that may lead to ransomware infections. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/credential-harvesting–screenconnect-cloud-administrators/758508/
-
Phishing über Google-Classroom mit 115000 E-Mails an 13500 Organisationen
Check Point Software Technologies hat eine groß angelegte Phishing-Kampagne aufgedeckt, die Google-Classroom missbraucht und noch aktiv ist. Millionen von Lehrern und Schülern weltweit nutzen die Plattform zur Bereitstellung von Leistungsnachweisen, Schulaufgaben und Lehrmaterial. Innerhalb von nur einer Woche starteten die Angreifer fünf koordinierte Wellen und versendeten mehr als 115 000 Phishing-E-Mails an 13 500 Organisationen…
-
Kimsuky APT Exposed: GPKI Certificates, Rootkits, and Cobalt Strike Assets Uncovered
A comprehensive operational dump from the North Korean Kimsuky APT organization, also known as APT43, Thallium, or Velvet Chollima, appeared on a dark web forum in an uncommon instance of state-sponsored cyber espionage. This leak, comprising virtual machine images, VPS dumps, phishing kits, rootkits, and over 20,000 browser history records, provides an unparalleled glimpse into…
-
BSIMail-Checker soll vor Hackern schützen
Das BSI bieten ein kostenloses Tool für E-Mail-Sicherheit an. Nutzer können damit prüfen, ob ihr E-Mail-Provider die aktuellen Schutzstandards erfüllt.Mit einem neuen Online-E-Mail-Checker können Nutzer künftig prüfen, ob ihr E-Mail-Anbieter zentrale Kriterien für eine sichere Kommunikation erfüllt. Denn E-Mails sind das wichtigste Einfallstor für Hacker egal ob es um Identitätsdiebstahl, Spionage oder um das Einschleusen…
-
Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing
The advanced persistent threat (APT) actor known as Transparent Tribe has been observed targeting both Windows and BOSS (Bharat Operating System Solutions) Linux systems with malicious Desktop shortcut files in attacks targeting Indian Government entities.”Initial access is achieved through spear-phishing emails,” CYFIRMA said. “Linux BOSS environments are targeted via weaponized .desktop First seen on thehackernews.com…
-
Hackers Exploit SendGrid to Steal User Login Credentials in Latest Attack
Tags: attack, cloud, communications, credentials, cyber, cybersecurity, defense, email, exploit, hacker, login, phishing, serviceCybersecurity researchers at the Cofense Phishing Defense Center (PDC) have uncovered a fresh surge in credential harvesting attacks that leverage the reputable cloud-based email service SendGrid to distribute phishing emails. Attackers are exploiting SendGrid’s trusted status, commonly used for transactional and marketing communications, to craft messages that evade standard email security gateways. By spoofing sender…
-
How AI is reshaping cybersecurity operations
Tags: access, ai, attack, business, ciso, cloud, control, cyber, cybersecurity, data, defense, detection, encryption, finance, gartner, governance, guide, hacker, infrastructure, intelligence, jobs, malware, microsoft, monitoring, phishing, regulation, resilience, risk, sans, service, skills, soc, strategy, supply-chain, technology, threat, tool, training, updateBecause AI can perform tasks at speeds that supersede human capacity, it exponentially scales the amount of work that a cybersecurity function can do, says Rob T. Lee, chief of research for AI and emerging threats and head of faculty at SANS Institute.Moreover, AI excels at doing repetitive tasks near perfectly every time, so it…
-
70 Prozent mehr Ransomware
25 Prozent mehr Phishing-Angriffe. Jeder zweite Angriff auf MSPs startete mit Phishing (52 Prozent). Die Cyberbedrohungslage blieb im ersten Halbjahr 2025 weiterhin angespannt, wie der aktuelle Acronis Cyberthreats Report für das erste Halbjahr zeigt [1]. Unternehmen waren vor allem von Ransomware betroffen; im Vergleich zum Vorjahreszeitraum stieg die Anzahl Betroffener um 70 Prozent an…. First…
-
Phishing Simulationen (und SEG) sind weitgehend nutzlos
Es gibt Firmen, die intern ihre Mitarbeiter einer Phishing-Schulung mit simulierten Angriffen unterziehen. In einer Studie wurde nun belegt, dass diese Phishing-Simulationen weitgehend nutzlos sind. Aber auch Secure Email Gateways können Phishing-Mails nicht aufhalten. Erkenntnisse zu Phishing-Simulationen Das Thema ging … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/08/24/phishing-simulationen-sind-weitgehend-nutzlos/
-
Fake CoinMarketCap Journalists Targeting Crypto Executives in Spear-Phishing Campaign
Fake CoinMarketCap journalist profiles used in spear-phishing target crypto execs via Zoom interviews, risking malware, data theft, and… First seen on hackread.com Jump to article: hackread.com/fake-coinmarketcap-journalists-crypto-executives-spear-phishing/
-
20-year-old Scattered Spider Member Sentenced to 10 Years in Prison
Noah Michael Urban, a 20-year-old Florida man, was sentenced for his role as a member of the notorious Scattered Spider threat group in a series of phishing and other scams between 2022 and 2023 in which they got victims’ credentials and used them to steal corporate information, customer data, and cryptocurrency. First seen on securityboulevard.com…

