-
Cofense researchers warn of a phishing scam where attackers use LiveChat to impersonate Amazon and PayPal agents and steal credit card and MFA codes.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Scammers are hijacking popular security tools like Cloudflare to hide fake Microsoft 365 login pages. Learn how this new invisible phishing campaign bypasses antivirus software and how you can stay safe.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Aryaka researchers have identified a new threat from a Russian-speaking group using ‘BlackSanta’ malware. By disguising attacks as job applications, hackers are bypassing security to target recruitment workflows.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Europol and partners dismantle Tycoon 2FA phishing service used to bypass MFA, disrupting a global phishing-as-a-service operation targeting organisations.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Phishing drives about 90% of cyberattacks in 2026, using tactics like encrypted flows, QR code scams, and trusted cloud platforms to steal credentials.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Hackers abuse the .arpa Top-Level Domain to host phishing scams, using IPv6 tunnels, reverse DNS tricks, and shadow domains to bypass security checks.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Varonis Threat Labs reveals 1Campaign, a platform used to trick Google Ads and hide phishing pages. Learn how this cloaking tool targets real users while evading security.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Fraudsters clone Avast’s website to target French users with a €499 phishing scam, using urgency tactics, live chat, and card validation to steal payment data.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new phishing campaign is spreading XWorm 7.2 via malicious Excel files, hiding the malware in Windows processes, and using AES encryption to steal passwords and Wi-Fi keys.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


