Phishing

This section has all the newest information on phishing, such as new tricks that attackers are using, well-known phishing scams, and effective ways to stop them. Keep up with how phishing is changing, what the big cases are, and how to spot and avoid phishing attempts. Our coverage keeps you up to date on this ongoing threat and how to keep your business and yourself safe.

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of Browser Security Report, revealing a sharp…

13 hours ago

Fake Coinbase Migration Messages Target Users to Steal Wallet Credentials

A sophisticated phishing campaign is currently targeting cryptocurrency investors with fraudulent emails claiming to be from Coinbase. The scam attempts…

2 days ago

Hackers Exploit Hard Disk Image Files to Deploy VenomRAT

In a recent cybersecurity threat, hackers have been using virtual hard disk image files (.vhd) to distribute the VenomRAT malware,…

3 days ago

Squid Werewolf Mimics Recruiters to Target Job Seekers and Steal Personal Data

In a sophisticated phishing campaign uncovered by the BI.ZONE Threat Intelligence team, the Squid Werewolf group, also known as APT37,…

3 days ago

Sophisticated Phishing Attack Leverages Microsoft 365 Infrastructure to Target Users

A highly sophisticated phishing campaign has been uncovered exploiting Microsoft 365's trusted infrastructure to facilitate credential harvesting and account takeover…

3 days ago

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service that facilitates communication between applications and…

6 days ago

New Microsoft 365 Attack Leverages OAuth Redirection for Credential Theft

Threat researchers at Proofpoint are currently tracking two sophisticated and highly targeted cyber-attack campaigns that are utilizing OAuth redirection mechanisms…

7 days ago

Hackers Exploit Microsoft Copilot for Advanced Phishing Attacks

Hackers have been targeting Microsoft Copilot, a newly launched Generative AI assistant, to carry out sophisticated phishing attacks. This campaign…

1 week ago

Hackers Exploit Advanced MFA Bypass Techniques to Compromise User Accounts

In recent years, phishing has remained the most prevalent form of cyberattack, with approximately 1.2% of global email traffic being…

1 week ago

North Korean Hackers Use ZIP Files to Deploy Malicious PowerShell Scripts

North Korean state-sponsored hackers, known as APT37 or ScarCruft, have been employing sophisticated tactics to breach systems, leveraging malicious ZIP…

1 week ago