phishing
-
Blog
Ongoing phishing attack abuses Google Calendar to bypass spam filters
An ongoing phishing scam is abusing Google Calendar invites and Google Drawings pages to steal credentials while bypassing spam filters. According to Check Point, which has been monitoring the phishing attack, the threat actors have targeted 300 brands with over 4,000 emails sent in four weeks. Check Point told BleepingComputer that the attacks targeted a broad range of companies, including educational institutions,…
Read More » -
Blog
Itch.io is currently offline due to a ‘trash AI-powered’ phishing report
Indie game storefront Itch.io is currently offline because of what it describes as a bogus phishing report. While the game store’s servers are still online, the domain for the website is currently pointing towards IP addresses that itch.io doesn’t own — making it inaccessible for most people. Itch.io blames pop culture collectibles company Funko for the issues in a post on…
Read More » -
Blog
New Rockstar 2FA phishing service targets Microsoft 365 accounts
A new phishing-as-a-service (PhaaS) platform named ‘Rockstar 2FA’ has emerged, facilitating large-scale adversary-in-the-middle (AiTM) attacks to steal Microsoft 365 credentials. Like other AiTM platforms, Rockstar 2FA enables attackers to bypass multifactor authentication (MFA) protections on targeted accounts by intercepting valid session cookies. These attacks work by directing victims to a fake login page that mimics Microsoft 365 and tricking them…
Read More » -
Blog
What is PhaaS (Phishing as a Service)?
Imagine buying a complete toolkit for cybercrime as quickly as subscribing to Netflix. That’s exactly what’s happening with Phishing as a Service (PhaaS), a dangerous evolution in cybercrime making headlines in 2024. This isn’t just another cybersecurity buzzword – it’s a lucrative criminal enterprise changing how attacks target everyday internet users like you. In this article, we will explain what…
Read More » -
Blog
Phishing emails increasingly use SVG attachments to evade detection
Threat actors increasingly use Scalable Vector Graphics (SVG) attachments to display phishing forms or deploy malware while evading detection. Most images on the web are JPG or PNG files, which are made of grids of tiny squares called pixels. Each pixel has a specific color value, and together, these pixels form the entire image. SVG, or Scalable Vector Graphics, displays…
Read More » -
Blog
What to do if you click on a phishing link
That heart-stopping moment when you click a link and instantly realize it was a mistake. According to the FBI’s Internet Crime Report 2023, you’re not alone – phishing attacks cost Americans $704.7 million last year, and one click can lead to devastating consequences. The golden hour: Your first 60 minutes matter “The first hour after clicking a suspicious link is…
Read More » -
Blog
Don’t Take the Bait on These Phishing Scams
Key Takeaways Phishing scams use social engineering and urgency to manipulate you into making bad decisions. You can spot red flags in suspicious emails by checking sender address and link destinations. Common phishing scams imitate banks or social media to trigger fear and prompt quick reactions. Verify through trusted methods instead. Email phishing scams have been around for a long…
Read More » -
Blog
Phishing tactics: The top attacks trends in 2024
Phishing is one of the simplest attack methods, but it is also among the most effective. Email addresses are easily stolen in cyber attacks, then used to target employees to persuade them to hand over data or download malware. A recent attack on greater Manchester councils is a prime example. It led to thousands of users being sent a phishing…
Read More » -
Blog
Phishing Attacks on Australia Disguised as Atlassian
Enterprises across Australia and the APAC region have been warned that cyber criminals are exploiting popular platforms like Atlassian to launch more convincing phishing attacks on law firms and other corporations. These attacks aim to steal employee credentials and breach company cyber security defences. Ryan Economos, APAC field chief technology officer at email security firm Mimecast, told TechRepublic that such…
Read More » -
Blog
How hackers are using legitimate tools to distribute phishing links
As both security tools and employees have become more astute at detecting traditional phishing attacks, threat actors have turned to manipulating trusted platforms to distribute phishing links hidden in seemingly legitimate URLs. In one example of this approach, a report from Barracuda Networks published on 12 September detailed a rise in phishing attacks leveraging trusted content creation and collaboration platforms.…
Read More »