Phishing Blog News(35)  -   2024  2023  2022  2021  2020  2019  2018

APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog

DATE

NAME

Info

CATEG.

WEB

21.12.24

CUCKOO SPEAR Part 2: Threat Actor Arsenal

In this report, Cybereason confirms the ties between Cuckoo Spear and APT10 Intrusion Set by tying multiple incidents together and disclosing new information about this group’s new arsenal and techniques.

Phishing blog

Cybereason

21.12.24

CUCKOO SPEAR Part 1: Analyzing NOOPDOOR from an IR Perspective

In this report, Cybereason confirms the ties between Cuckoo Spear and APT10 Intrusion Set by tying multiple incidents together and disclosing new information about this group’s new arsenal and techniques.

Phishing blog

Cybereason

2.11.24

Threat actors use copyright infringement phishing lure to deploy infostealers* Cisco Talos has observed an unknown threat actor conducting a phishing campaign targeting Facebook business and advertising account users in Taiwan. * The decoy email and fake PDF filenames are designed to impersonate a company's legal department, attempting to lure thePhishing blogCisco Blog

28.9.24

Investigating Infrastructure and Tactics of Phishing-as-a-Service Platform Sniper DzWe have been monitoring a widely popular phishing-as-a-service (PhaaS) platform named Sniper Dz that primarily targets popular social media platforms and online services. A large number of phishers could be using this platform to launch phishing attacks, since the group behind this kit has thousands of subscribers on its Telegram channel. Our research revealed over 140,000 phishing websites associated with the Sniper Dz PhaaS platform over the past year. Phishing blogPalo Alto

31.8.24

TLD Tracker: Exploring Newly Released Top-Level Domains

We investigated 19 new top-level domains (TLDs) released in the past year, which revealed large-scale phishing campaigns, distribution of potentially unwanted programs, torrenting websites, and even pranking and meme campaigns.

Phishing blog

Palo Alto

24.8.24

PWA phishing on Android and iOS – Week in security with Tony AnscombePhishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's securityPhishing blogEset

6.7.24

No room for error: Don’t get stung by these common Booking.com scamsFrom sending phishing emails to posting fake listings, here’s how fraudsters hunt for victims while you’re booking your well-earned vacationPhishing blogEset
29.6.24Worldwide 2023 Email Phishing Statistics and ExamplesExplore the need for going beyond built-in Microsoft 365 and Google Workspace™ security based on email threats detected in 2023.Phishing blogTrend Micro
4.5.24How space exploration benefits life on Earth: Q&A with David EicherThe investigation uncovered at least 40,000 phishing domains that were linked to LabHost and tricked victims into handing over their sensitive details Phishing blogEset
28.4.24Major phishing-as-a-service platform disrupted – Week in security with Tony AnscombeThe investigation uncovered at least 40,000 phishing domains that were linked to LabHost and tricked victims into handing over their sensitive detailsPhishing blogEset