-
An ongoing wave of phishing campaigns exploiting fake meeting invites from popular video conferencing platforms, including Zoom, Microsoft Teams, and Google Meet. The attacks use social engineering to lure corporate users into downloading malicious “so…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
XWorm, a multi-functional .NET‑based RAT first observed in 2022, remains actively traded across cybercrime marketplaces and continues to attract both low-skilled and advanced operators thanks to its rich feature set and plugin-based architecture. Once …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The 2025 spam and phishing landscape shows a sharp rise in AI-generated lures and QR code–based “quishing,” alongside complex malware campaigns abusing cracked games and software to deliver information stealers at scale. These trends highlight how soci…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Attackers are using Pride Month themed phishing emails to target employees worldwide, abusing trusted email platforms like SendGrid to harvest credentials.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Global Group ransomware is delivered through phishing emails and can encrypt files offline without any internet connection.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A sophisticated new phishing campaign is targeting Apple Pay users, leveraging high-quality email design and social engineering to bypass security measures. Unlike typical scams that rely on poorly spelled emails and suspicious links, this campaign use…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new wave of phishing campaigns where scammers are abusing Google’s legitimate infrastructure to bypass security filters. Attackers are now creating free developer accounts on Google Firebase to send fraudulent emails that impersonate well-known brand…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Two medium-severity vulnerabilities, an unsecured email API endpoint and verbose error messages exposing OAuth tokens, chain together to enable authenticated phishing that bypasses all email security controls, persistent access to Microsoft 365 environ…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Compromised home routers in 30+ countries had DNS traffic redirected, sending users to malicious sites while normal browsing appeared unaffected.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
ANY.RUN experts report a surge in phishing campaigns abusing trusted cloud and CDN platforms to bypass security controls and target enterprise users.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


