This section has all the newest information on phishing, such as new tricks that attackers are using, well-known phishing scams, and effective ways to stop them. Keep up with how phishing is changing, what the big cases are, and how to spot and avoid phishing attempts. Our coverage keeps you up to date on this ongoing threat and how to keep your business and yourself safe.
The rapid evolution of Phishing-as-a-Service (PhaaS) platforms is reshaping the threat landscape, enabling attackers to launch increasingly sophisticated phishing campaigns.…
Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms. Phishing campaigns are delivered via Telegram…
As California grapples with devastating wildfires, communities are rallying to protect lives and property. Unfortunately, these disasters have also created…
Cybercriminals are executing sophisticated phishing attacks targeting Microsoft 365 users by employing deceptive URLs that closely resemble legitimate O365 domains,…
Fraudsters in the Middle East are exploiting a vulnerability in the government services portal. By impersonating government officials, they target…
CrowdStrike, a leader in cybersecurity, uncovered a sophisticated phishing campaign that leverages its recruitment branding to propagate malware disguised as…
A new and sophisticated phishing scam has been uncovered, leveraging Microsoft 365 domains to trick users into compromising their PayPal…
Cybercriminals have developed PhishWP, a malicious WordPress plugin, to facilitate sophisticated phishing attacks, which enable attackers to create convincing replicas…
A phishing campaign spoofing the United States Social Security Administration emerged in September 2024, delivering emails with embedded links to…
The Tycoon 2FA platform is a Phishing-as-a-Service (PhaaS) tool that enables cybercriminals to easily launch sophisticated phishing attacks targeting two-factor…