Cyberveille
curated by Decio
Nuage de tags
Mur d'images
Quotidien
Rechercher
Flux RSS
Flux RSS
Daily Feed
Weekly Feed
Monthly Feed
tags
search
Microsoft Dynamics 365 Customer Voice Phishing Scam
Sharp rise in reported cyber incidents in Switzerland
Emerging Phishing Techniques: New Threats and Attack Vectors
Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows
Google Spoofed Via DKIM Replay Attack
Phishers abuse Google OAuth to spoof Google in DKIM replay attack
PhaaS actor uses DoH and DNS MX to dynamically distribute phishing
Pulling the Threads on the Phish of Troy Hunt
Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware
Fake "Security Alert" issues on GitHub use OAuth app to hijack accounts
Storm-2372 conducts device code phishing campaign
Hackers spoof Microsoft ADFS login pages to steal credentials
X Phishing | Campaign Targeting High Profile Accounts Returns, Promoting Crypto Scams
The great Google Ads heist: criminals ransack advertiser accounts via fake Google ads | Malwarebytes
Recruitment Phishing Scam Imitates Hiring Process
New details reveal how hackers hijacked 35 Google Chrome extensions
Effective Phishing Campaign Targeting European Companies and Organizations
Google Calendar Notifications Bypassing Email Security Policies
Cloudflare’s developer domains increasingly abused by threat actors
Abnormal Security
Windows infected with backdoored Linux VMs in new phishing attacks
CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits
DocuSign's Envelopes API abused to send realistic fake invoices
North Korean hackers employ new tactics to compromise crypto-related businesses - Help Net Security
CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging - Securonix
Every Doggo Has Its Day: Unleashing the Xiū Gǒu Phishing Kit
Self-contained HTML phishing attachment using Telegram to exfiltrate stolen credentials - SANS Internet Storm Center
Microsoft creates fake Azure tenants to pull phishers into honeypots
File hosting services misused for identity phishing
Mamba 2FA: A new contender in the AiTM phishing ecosystem - Sekoia.io Blog
Arrests in international operation targeting cybercriminals in West Africa
Criminal phishing network resulting in over 480 000 victims worldwide busted in Spain and Latin America | Europol
Clever 'GitHub Scanner' campaign abusing repos to push malware
A Single Iranian Hacker Group Targeted Both Presidential Campaigns
Russia-linked phishing campaigns ensnare civil society and NGOs
Les cybercriminels ont copié dieci.ch à l'identique
USPS Text Scammers Duped His Wife, So He Hacked Their Operation | WIRED
Social Media Malvertising Campaign Promotes Fake AI Editor Website for Credential Theft
Behind the Attack: Live Chat Phishing
How do cryptocurrency drainer phishing scams work?
Formula 1 governing body discloses data breach after email hacks
Analysis of the Phishing Campaign: Behind the Incident
Security bug allows anyone to spoof Microsoft employee emails
Cybercriminals Exploit Docusign With Customizable Phishing Templates
Nearly 20% of Docker Hub Repositories Spread Malware & Phishing Scams
Students turning to cyberfraud as huge phishing
Les attaques informatiques contre les ENT continuent dans le Nord ...
Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kit
Microsoft Threat Intelligence unveils targets and innovative tactics amidst tax season
New Attack Techniques Bypassing ML Security
Google Chrome gets real-time phishing protection later this month
Threat actors leverage document publishing sites for ongoing credential and session token theft
Flipper Zero WiFi phishing attack can unlock and steal Tesla cars
Jamf says 9% of smartphone have fallen for phishing attacks
Scattered Spider laying new eggs
Community Alert: Ongoing Malicious Campaign Impacting Azure Cloud Environments
DarkGate malware delivered via Microsoft Teams - detection and response
AI will make scam emails look genuine, UK cybersecurity agency warns
Framework Data Breach - General Topics - Framework Community
NSA official: hackers use AI bots like ChatGPT to perfect English
Russian military hackers target Ukraine with new MASEPIE malware
Crypto drainer steals $59 million from 63k people in Twitter ad push
Hackers Exploiting MS Excel Vulnerability to Spread Agent Tesla Malware
Hackers swipe Booking.com, damage from attack is global
Arnaque: les clients de booking.com ciblés par des pirates
Détournement de Microsoft et Cloudflare au cours d’une nouvelle attaque de QRishing
D-Link confirms data breach after employee phishing attack
LinkedIn Smart Links Fuel Credential Phishing Campaign
When MFA isn't actually MFA
Attacker combines phone, email lures into believable, complex attack chain
Okta customers targeted in social engineering scam
Adversary On The Defense: ANTIBOT.PW
Phishing pages placed on hacked websites
Threat Actors Add .zip Domains to Their Phishing Arsenals
WormGPT: New AI Tool Allows Cybercriminals to Launch Sophisticated Cyber Attacks
Cybercriminalité : sept suspects identifiés pour du « phishing / hameçonnage »
Storm-0978 attacks reveal financial and espionage motives
Microsoft Encrypted Restricted Permission Messages Deliver Phishing | Trustwave
Securonix Threat Labs Security Advisory: Latest Update: Ongoing MEME#4CHAN Attack/Phishing Campaign uses Meme-Filled Code to Drop XWorm Payloads
New phishing-as-a-service tool “Greatness” already seen in the wild
Can Better Training Reduce the Success Rate of Phishing Attacks?
Investigating ChatGPT phishing detection capabilities
Alerte sur des tentatives de piratage de comptes bancaires en Suisse
A Noteworthy Threat: How Cybercriminals are Abusing OneNote
The Growing Threat of ChatGPT-Based Phishing Attacks
HTML Smuggling: The Hidden Threat in Your Inbox
Bitwarden password vaults targeted in Google ads phishing attack
Cost of data breaches to surpass US$5mn per incident in 2023
An infostealer comes to town: Dissecting a highly evasive malware targeting Italy
Meddler-in-the-Middle Phishing Attacks Explained MitM
Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns
How we handled a recent phishing incident that targeted Dropbox
Cyble Phishing ERMAC Android Malware Increasingly Active
Void Balaur | The Sprawling Infrastructure of a Careless Mercenary
Revolut hack exposes data of 50,000 users, fuels new phishing wave
Charming Kitten: “Can We Have A Meeting?”
Lampion Trojan Utilizes New Delivery through Cloud-Based Sharing
Corte dei conti e l'hacker che ha violato account WhatsApp
Campagne de phishing Instagram : la certification sur les réseaux sociaux, ou le nouveau piège des hackers
Roasting 0ktapus: The phishing campaign going after Okta identity credentials
Legitimate SaaS Platforms Being Used to Host Phishing Attacks
Disrupting SEABORGIUM’s ongoing phishing operations
DigitalOcean says customer email addresses were exposed after latest Mailchimp breach – TechCrunch
Cisco confirms May attack by Yanluowang ransomware group
Phishers who breached Twilio and targeted Cloudflare could easily get you, too
Large-Scale AiTM Attack targeting enterprise users of Microsoft email services
IPFS: The New Hotbed of Phishing
From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud
Ongoing phishing campaign can hack you even when you’re protected with MFA
Verified Twitter accounts phished via hate speech warnings
BRATA is evolving into an Advanced Persistent Threat
Hackers breach MailChimp's internal tools to target crypto customers
Behold, a password phishing site that can trick even savvy users
Ukraine warns of InvisiMole attacks tied to state-sponsored Russian hackers
Belarus conducted widespread phishing campaigns against Ukraine, Poland, Google says
Asylum Ambuscade: State Actor Uses Compromised Private Ukrainian Military Emails to Target European Governments and Refugee Movement
Phishing attacks target countries aiding Ukrainian refugees
Ukraine links phishing targeting military to Belarusian hackers
Google Docs Comment Exploit Allows for Distribution of Phishing and Malware