Phishing Blog- 2026  2025 2024  2023  2022  2021  2020  2019  2018

APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog

DATE

NAME

Info

CATEG.

WEB

1.2.26 Special Alert: SLSH Malicious "Supergroup" Targeting 100+ Organizations via Live Phishing Panels A massive identity-theft campaign is currently active, targeting Okta Single Sign-On (SSO) and other SSO platform accounts across 100+ high-value enterprises. Phishing blog Silent Push
24.1.26 The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time Imagine visiting a webpage that looks perfectly safe. It has no malicious code, no suspicious links. Yet, within seconds, it transforms into a personalized phishing page. Phishing blog Palo Alto
17.1.26 Microsoft Remains the Most Imitated Brand in Phishing Attacks in Q4 2025 In Q4 2025, Microsoft once again ranked as the most impersonated brand in phishing attacks, ... Phishing blog CHECKPOINT
17.1.26 Ransomware and Supply Chain Attacks Soared in 2025 The threat landscape shifted significantly in 2025. Here are the threats and trends to watch as we enter 2026. Phishing blog

Cyble

17.1.26 Mamba Phishing-as-a-Service Kit: How Modern adversary-in-the-middle (AiTM) Attacks Operate INTRODUCTION CYFIRMA assesses that Mamba 2FA is a representative of a broader class of adversary-in-the-middle phishing frameworks that have become increasingly prevalen Phishing blog

Cyfirma

17.1.26 The Unfriending Truth: How to Spot a Facebook Phishing Scam Before It's Too Late In the second half of 2025, Trellix observed a surge in credential-stealing Facebook phishing scams, particularly those using the sophisticated "Browser in the Browser" (BitB) technique to trick users with fake login pop-ups. Phishing blog Trelix
10.1.26 Beyond MFA: Identity Abuse Through Token Interception and Consent Manipulation EXECUTIVE SUMMARY Multi-Factor Authentication (MFA) has long been positioned as a definitive control against credential-based attacks. However, recent phishing campaigns Phishing blog

Cyfirma

10.1.26 Phishing actors exploit complex routing and misconfigurations to spoof domains Threat actors are exploiting complex routing scenarios and misconfigured spoof protections to send spoofed phishing emails, crafted to appear as internally sent messages. Phishing blog Microsoft blog