Email Security

New PhaaS Platform Lets Attackers Bypass Two-Factor Authentication

Several phishing campaign kits have been used widely by threat actors in the past. One popular PhaaS (Phishing-as-a-Platform) was Caffeine,…

10 months ago

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes. Resecurity researchers have recently revealed that…

10 months ago

Beware WARMCOOKIE Backdoor Knocking Your Inbox

WARMCOOKIE is a new Windows backdoor that is deployed by a phishing effort with a recruiting theme dubbed REF6127. The…

10 months ago

Remcos RAT Distributed As UUEncoding (UUE) File To Steal Logins

Researchers identified a campaign distributing Remcos RAT, a Remote Access Trojan, where the attack uses phishing emails disguised as legitimate…

10 months ago

Sticky Werewolf Weaponizing LNK Files Group Attacking To Attack Organizations

Sticky Werewolf, a cyber threat group, has shifted its targeting strategy from sending phishing emails with download links to malicious…

10 months ago

UNC1151 Hackers Weaponizing Excel Documents To Attack Windows Machine

Mandiant identified a UNC1151 information campaign targeting Ukraine, Lithuania, Latvia, and Poland with disinformation, as CRIL linked a recent malicious…

10 months ago

Hackers Attacking Banking Customers Using Phishing-As-A-Service V3B Toolkit

A cybercriminal group is selling and distributing a sophisticated phishing kit called "V3B" through Phishing-as-a-Service (PhaaS) and self-hosting methods, which…

10 months ago

Beware Of Phishing Emails Prompting Execution Via Paste (CTRL+V)

Phishing attackers are distributing malicious HTML files as email attachments, containing code designed to exploit users by prompting them to…

10 months ago

CarnavalHeist Weaponizing Word Documents To Steal Login Credentials

Hackers take advantage of Word documents as weapons due to their widespread use and trust. This is facilitated by the…

10 months ago

Hackers Exploiting Docusign With Phishing Attack To Steal Credentials

Hackers prefer phishing as it exploits human vulnerabilities rather than technical flaws which make it a highly effective and low-cost…

11 months ago