This phishing kit bypasses 2FA via session hijacking and real-time credential theft. Kurt “CyberGuy" Knutsson offers four ...
New research shows that instead of attention-grabbing subject lines, scammers are going with more subtle pitches to get you ...
The Major Organised Crime and Anti-Corruption Agency (MOCA) has arrested two additional suspects in connection with the $47.5 ...
A large number of phishing campaigns emerged in the aftermath of the Bybit heist, designed to siphon cryptocurrency from its ...
Guardio, a leading cybersecurity company, released its Q1 2025 Brand Phishing Report, highlighting key trends in phishing attacks. With the rise of AI technologies, the scale and sophistication of ...
A phishing-as-a-service (PhaaS) platform named 'Lucid' has been targeting 169 entities in 88 countries using well-crafted ...
Cybercriminals are switching up tactics for their social engineering trickery to increase authenticity, better bypass filters ...
A new attack targeting Microsoft Teams users used vishing, remote access tools and DLL sideloading to deploy a JavaScript ...
Cybercriminals are using AI to craft highly convincing phishing scams, from deepfake impersonations to automated attacks, ...
A hacker stole $5.4 million worth of ETH from lending protocol zkLend. In a fate of karma, the hacker claimed to have lost ...
A newly discovered phishing-as-a-service (PhaaS) operation that researchers call Morphing Meerkat, has been using the DNS ...
What’s alarming about Lucid is that it involved phishing messages sent via Apple’s iMessage, which uses end-to-end encryption ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results