-
A new phishing campaign is using stolen certificates from TrustConnect Software PTY LTD to sign malware. By impersonating updates for Zoom and Microsoft Teams, hackers install RMM tools to gain persistent, privileged access to networks
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Swap scams target traders through fake DEX sites, token approvals, and phishing. Learn how to detect swap scams and protect funds before you swap now.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Phishing drives about 90% of cyberattacks in 2026, using tactics like encrypted flows, QR code scams, and trusted cloud platforms to steal credentials.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A sophisticated phishing campaign has recently emerged, leveraging Google Cloud’s trusted infrastructure to host malicious redirects. The campaign’s technical structure leverages Google Cloud Storage legitimate domain, googleapis.com, which is widely t…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft recently uncovered sophisticated phishing campaigns that exploit the by-design redirection mechanisms of the OAuth 2.0 protocol. Threat actors are targeting government and public-sector organizations by manipulating legitimate authentication …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Hackers abuse the .arpa Top-Level Domain to host phishing scams, using IPv6 tunnels, reverse DNS tricks, and shadow domains to bypass security checks.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new phishing framework called Starkiller is raising the bar for “phishing-as-a-service” by serving victims the real login pages of major brands through attacker infrastructure, making pages look authentic and stay up to date. By acting as a live reve…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
GTFire is a large-scale phishing scheme that abuses multiple Google services to hide malicious infrastructure, evade security tools, and steal credentials from organizations worldwide. GTFire is a credential-harvesting operation that chains Google Fire…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Fraudsters clone Avast’s website to target French users with a €499 phishing scam, using urgency tactics, live chat, and card validation to steal payment data.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Agent Tesla continues to cement its status as one of the most persistent remote access trojans (RATs) in the global threat landscape. Known for its data‑stealing capabilities and extensive distribution network, this malware remains a weapon of choice f…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


