Tag:
Phishing Attacks
Cyber Security News
Hackers Attacking Global Sporting Championships Via Fake Domains To Steal Logins
Cybercriminals online take advantage of well-known events to register malicious domains with keywords related to the event, with the intention of tricking users through...
Cyber Security News
Cloudflare Developer Domains Abused For Cyber Attacks
Cloudflare Pages, a popular web deployment platform, is exploited by threat actors to host phishing sites, as attackers leverage Cloudflare's trusted infrastructure, global CDN,...
Cyber Security News
Weaponized Word Documents Attacking Windows Users to Deliver NetSupport & BurnsRAT
The threat actors distributed malicious JS scripts disguised as legitimate business documents, primarily in ZIP archives with names like "Purchase request" or "Request for...
Cyber Attack
APT-C-60 Attacking HR Department With Weaponized Resumes
APT-C-60 launched a phishing attack in August 2024, targeting domestic organizations with malicious emails disguised as job applications.These emails, sent to recruitment departments,...
Cyber Security News
Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims to fake login pages hosted on Weebly, targeting telecommunications...
cyber security
North Korean IT Worker Using Weaponized Video Conference Apps To Attack Job Seakers
North Korean IT workers, operating under the cluster CL-STA-0237, have been implicated in recent phishing attacks leveraging malware-infected video conference apps. The group, likely based...
Cyber Attack
Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files
Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals in various sectors.The attacks involve sending signed RDP configuration...
Cyber Security News
Hackers Abuse HTML Smuggling Technique To Deliver Sophisticated Phishing Page
Phishing attackers employed an HTML smuggling technique to deliver a malicious payload, as the attack chain started with a phishing email mimicking an American...