Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft
New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo
20 articles
New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo
Introduction In the final quarter of 2025, Google Threat Intelligence Group (GTIG) observed threat actors increasingly integrating artificial intelligence (A...
Google researchers found that government-backed hackers now use AI throughout the whole attack lifecycle
Campaign combines stolen Telegram accounts, fake Zoom calls and ClickFix attacks to deploy infostealer malware
Operation Cyber Guardian was Singapore’s largest and longest running anti-cyber threat law enforcement operation
Written by: Ross Inman, Adrian Hernandez Introduction North Korean threat actors continue to evolve their tradecraft to target the cryptocurrency and decentr...
Rublevka Team exemplifies the industrialization of crypto scams. Learn how traffer teams and wallet drainers enable high-volume theft.
Multi-stage attack begins with fake message relating to business requests and evades detection with link hidden in a PDF
Bitdefender has discovered a new Android malware campaign that uses Hugging Face
CrowdStrike assessed that two new threat actor groups have spun off from North Korean Labyrinth Chollima hackers
The RedKitten campaign distributes lures designed to target people seeking information about missing persons or political dissidents in Iran
The FBI outlines ten actions which organizations can take to defend networks against cybercriminal and nation-state threats
Researchers discover that PureRAT’s code now contains emojis – indicating it has been written by AI based-on comments ripped from social media.
Fortra researchers have discovered a new SEO poisoning operation known as “HaxorSEO”
A destructive cyber attack targeting Poland’s energy sector has been linked to Russian APT group Sandworm
Phoney email alerts suggest users need to backup their LastPass accounts within 24 hours.
Loan phishing operation in Peru is stealing card info by impersonating financial institutions
Cybersecurity Researchers at ReliaQuest warn of an ongoing campaign delivered to “high-value individuals” via LinkedIn messages
TamperedChef creates backdoors and steals user credentials – particularly in organizations reliant on technical equipment
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmenta...