Tag: phishing
-
Surge in Smishing Fueled by Lucid PhaaS Platform
Chinese-Speaking Operators Have Made Lucid a ‘Primary Source’ of Phishing. Security researchers say they expect a surge this year in text message smishing fueled by a phishing-as-a-service platform operated by Chinese-speaking threat actors. Lucid already is a primary source of phishing campaigns targeting users in Europe, the United Kingdom and the United States. First seen…
-
What is subdomain hijacking?
by
in SecurityNewsSubdomain hijacking is a cybersecurity risk where attackers exploit abandoned DNS records to take control of legitimate subdomains. This can lead to phishing attacks, credential theft, and malware distribution. Organizations must regularly audit DNS records, remove outdated entries, and strengthen cloud security policies to prevent these vulnerabilities. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/04/what-is-subdomain-hijacking/
-
Hackers Exploit Cloudflare for Advanced Phishing Attacks
by
in SecurityNewsA sophisticated phishing campaign orchestrated by a Russian-speaking threat actor has been uncovered, revealing the abuse of Cloudflare services and Telegram for malicious purposes. Researchers at Hunt.io have identified this new wave of attacks, which employs Cloudflare-branded phishing pages and advanced tactics to evade detection. The campaign utilizes Cloudflare’s Pages.dev and Workers.dev platforms typically used…
-
Threat-informed defense for operational technology: Moving from information to action
by
in SecurityNews
Tags: access, ai, attack, automation, blueteam, cloud, control, crime, cyber, cyberattack, cybercrime, cybersecurity, data, defense, detection, exploit, finance, fortinet, framework, group, incident response, infrastructure, intelligence, law, malicious, malware, mitre, network, phishing, PurpleTeam, ransomware, RedTeam, resilience, risk, service, soar, strategy, tactics, technology, threat, tool, usaThe rise of cybercrime-as-a-service Today’s macro threat landscape is a flourishing ecosystem of cybercrime facilitated by crime-as-a-service (CaaS) models. Cybercriminal networks now operate like legitimate businesses, with specialized units dedicated to activities such as money laundering, malware development, and spear phishing. This ecosystem lowers the barrier to entry for cybercrime, enabling low-skilled adversaries to launch…
-
QR Code Phishing (Quishing) Attack Your Smartphones To Steal Microsoft Accounts Credentials
by
in SecurityNewsCybersecurity researchers have identified a growing trend in phishing attacks leveraging QR codes, a tactic known as >>quishing.
-
Steam Surges to Top of Most Spoofed Brands List in Q1
by
in SecurityNewsGaming community Steam appeared most often in phishing emails and texts detected by Guardio in Q1 2025 First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/steam-surges-top-most-spoofed/
-
Ongoing Gamaredon phishing campaign targets Ukraine with Remcos RAT
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/ongoing-gamaredon-phishing-campaign-targets-ukraine-with-remcos-rat
-
Global iOS, Android SMS phishing facilitated by Lucid PhaaS platform
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/global-ios-android-sms-phishing-facilitated-by-lucid-phaas-platform
-
Android, iOS Phishing Attacks Use Lucid PhaaS Platform
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/android-ios-phishing-attacks-use-lucid-phaas-platform
-
Lucid PhaaS Hits 169 Targets in 88 Countries Using iMessage and RCS Smishing
A new sophisticated phishing-as-a-service (PhaaS) platform called Lucid has targeted 169 entities in 88 countries using smishing messages propagated via Apple iMessage and Rich Communication Services (RCS) for Android.Lucid’s unique selling point lies in its weaponizing of legitimate communication platforms to sidestep traditional SMS-based detection mechanisms.”Its scalable, First seen on thehackernews.com Jump to article: thehackernews.com/2025/04/lucid-phaas-hits-169-targets-in-88.html
-
New Phishing Attack Combines Vishing and DLL Sideloading Techniques
A new attack targeting Microsoft Teams users used vishing, remote access tools and DLL sideloading to deploy a JavaScript backdoor First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/phishing-attack-combines-vishing/
-
LLMs are now available in snack size but digest with care
by
in SecurityNewsPassed down wisdom can distort reality: Rather than developing their own contextual understanding, student models rely heavily on their teacher models’ pre-learned conclusions. Whether this limitation can lead to model hallucination is highly debated by experts.Brauchler is of the opinion that the efficiency of the student models is tied to that of their teachers, irrespective…
-
Infostealer malware poses potent threat despite recent takedowns
by
in SecurityNewsHow CISOs can defend against infostealers: To defend against these threats, CISOs should rely on multi-factor authentication MFA and least privilege access to prevent their incursion into the corporate network, as well as endpoint detection and response (EDR) and anti-malware to detect and quarantine infostealers that manage to trick users into running the malware. Regular…
-
6 hard-earned tips for leading through a cyberattack, from CSOs who’ve been there
by
in SecurityNews
Tags: attack, awareness, breach, business, cisco, ciso, control, cyber, cyberattack, cybersecurity, data, group, incident response, infosec, infrastructure, lessons-learned, military, open-source, phishing, phone, privacy, programming, ransomware, security-incident, service, skills, software, strategy, threat, training, updateDevelop muscle memory, and patience, through simulations: Authority under crisis is meaningless if you can’t establish followership. And this goes beyond the incident response team: CISOs must communicate with the entire organization, a commonly misunderstood imperative, says Pablo Riboldi, CISO of nearshore talent provider BairesDev.”I find that employee involvement tends to be overlooked during cyberattacks.…
-
Morphing Meerkat’s Phishing Tactics: Abusing DNS MX Records
by
in SecurityNewsA recent report has uncovered a sophisticated phishing operation that uses DNS techniques to tailor content to victims. First seen on securityonline.info Jump to article: securityonline.info/morphing-meerkats-phishing-tactics-abusing-dns-mx-records/
-
Privacy Roundup: Week 13 of Year 2025
by
in SecurityNews
Tags: access, ai, android, apple, application-security, breach, browser, cctv, chrome, cloud, cve, cybersecurity, data, detection, exploit, firmware, google, group, leak, linux, malware, microsoft, mobile, phishing, privacy, regulation, router, scam, service, software, technology, threat, tool, update, virus, vpn, vulnerability, zero-dayThis is a news item roundup of privacy or privacy-related news items for 23 MAR 2025 – 29 MAR 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional “security” content mixed-in here due to the close relationship between online privacy and cybersecurity – many things may overlap;…
-
Täuschend echt: KI macht Phishing gefährlicher
by
in SecurityNewsPhishing bleibt eine der erfolgreichsten Methoden im Arsenal von Cyberkriminellen. Perfekt gefälschte E-Mails, Deepfakes und Fake-Webseiten nehmen rasant zu. KI-Apps sammeln Daten und können Angreifern unbeabsichtigt Türen öffnen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/taeuschend-echt-ki-macht-phishing-gefaehrlicher/a40351/
-
DarkCloud: An Advanced Stealer Malware Sold on Telegram to Target Windows Data
by
in SecurityNewsDarkCloud, a highly advanced stealer malware, has emerged as a significant threat to Windows systems since its debut in 2022. Initially gaining traction through underground forums, the malware is now widely sold on Telegram, making it accessible to cybercriminals worldwide. DarkCloud employs a variety of distribution techniques, with phishing campaigns being the most prevalent. Attackers…
-
Phishing platform ‘Lucid’ behind wave of iOS, Android SMS attacks
by
in SecurityNewsA phishing-as-a-service (PhaaS) platform named ‘Lucid’ has been targeting 169 entities in 88 countries using well-crafted messages sent on iMessage (iOS) and RCS (Android). First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/phishing-platform-lucid-behind-wave-of-ios-android-sms-attacks/
-
PCI DSS 4.0: Datensicherheit stärken mit Phishing-resistenter MFA
by
in SecurityNewsFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/pci-dss-datensicherheit-phishing-mfa
-
Russia-linked Gamaredon targets Ukraine with Remcos RAT
by
in SecurityNews
Tags: apt, attack, cyberespionage, group, phishing, powershell, rat, russia, spear-phishing, ukraineRussia-linked Gamaredon targets Ukraine with a phishing campaign using troop-related lures to deploy the Remcos RAT via PowerShell downloader. Talos researchers warn that Russia-linked APT group Gamaredon (a.k.a. Armageddon, Primitive Bear, ACTINIUM, Callisto) targets Ukraine with a phishing campaign. The cyberespionage group is behind a long series of spear-phishing attacks targeting Ukrainian entities, and organizations related…
-
Phishing-Angreifer setzen zunehmen auf russische Bullet-Proof-Domains
by
in SecurityNewsZwischen Dezember 2024 und Januar 2025 haben Forscher des KnowBe4 Threat Labs einen 98-prozentigen Anstieg von Phishing-Kampagnen festgestellt, die über russische Top-Level-Domains (TLDs) gehostet wurden. Das Besondere daran: betrieben werden diese Domains von so genannten “šbullet-proof’ Domain-Hosts. Sie sind dafür bekannt, gemeldete bösartige Webseiten, die für Phishing-Angriffe missbraucht werden, weiterlaufen zu lassen und Missbrauchsmeldungen zu…
-
Morphing Meerkat phishing kits exploit DNS MX records
Morphing Meerkat phishing kits exploit DNS MX records to deliver spoofed login pages, targeting over 100 brands. Infoblox researchers discovered a new phishing-as-a-service (PhaaS) platform that generated multiple phishing kits, called Morphing Meerkat, using DNS mail exchange (MX) records to deliver fake login pages and targeting over 100 brands. Threat actors are exploiting DNS techniques…
-
Hackers Distributing Phishing Malware Via SVG Format To Bypass File Detection
by
in SecurityNewsCybersecurity experts at the AhnLab Security Intelligence Center (ASEC) have uncovered a novel phishing malware distribution method leveraging the Scalable Vector Graphics (SVG) file format to bypass detection mechanisms. SVG, an XML-based vector image format widely used for icons, logos, charts, and graphs, enables the embedding of CSS and JavaScript scripts. However, attackers are now…
-
Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine
by
in SecurityNewsEntities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote access trojan called Remcos RAT.”The file names use Russian words related to the movement of troops in Ukraine as a lure,” Cisco Talos researcher Guilherme Venere said in a report published last week. “The PowerShell downloader contacts geo-fenced…
-
Russian Intelligence Impersonates CIA in Phishing Attacks
by
in SecurityNewsSilent Push Threat Analysts uncover a multi-cluster phishing operation leveraging fake CIA and anti-Putin group websites to harvest First seen on securityonline.info Jump to article: securityonline.info/russian-intelligence-impersonates-cia-in-phishing-attacks/