FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Phishing

20 articles

Security Affairs Phishing Cisco 10h ago

UAT-10362 linked to LucidRook attacks targeting Taiwan-based institutions

LucidRook is Lua malware used in phishing attacks on NGOs and universities in Taiwan, linked to UAT-10362, spread via password-protected emails. LucidRook is...

T1566

Security Affairs →

GBHackers Phishing GitHub GitLab 15h ago

GitHub, GitLab Abused for Malware and Phishing Campaigns

Hackers are increasingly abusing trusted software development platforms GitHub and GitLab to host malware and credential phishing campaigns, making defensive...

T1566 T1598

GBHackers →

SANS ISC Phishing Oracle 15h ago

Obfuscated JavaScript or Nothing, (Thu, Apr 9th)

I spotted an interesting piece of JavaScript code that was delivered via a phishing email in a RAR archive. The file was called “cbmjlzan.

T1566 1 IOC

SANS ISC →

BleepingComputer Phishing 1d ago

New ‘LucidRook’ malware used in targeted attacks on NGOs, universities

A new Lua-based malware, called LucidRook, is being used in spear-phishing campaigns targeting non-governmental organizations and universities in Taiwan. [.

T1566

BleepingComputer →

BleepingComputer Phishing Microsoft 1d ago

New VENOM phishing attacks steal senior executives' Microsoft logins

Threat actors using a previously undocumented phishing-as-a-service (PhaaS) platform called "VENOM" are targeting credentials of C-suite executives across mu...

T1566

BleepingComputer →

SC Media Phishing Google 1d ago

Actor tied to Raccoon targets 'several dozen' companies by exploiting BPOs and helpdesks

Google says UNC6783 leverages social engineering and phishing campaigns to gain entry to the BPOs.

T1566 T1204

SC Media →

The Hacker News Phishing 1d ago

UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns

A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations ...

T1566

The Hacker News →

BleepingComputer Phishing 1d ago

When attackers already have the keys, MFA is just another door to open

Stolen credentials turn authentication systems into the attack surface. Token shows how wearable biometric authentication verifies the user—not the session—b...

T1566 T1078 T1556

BleepingComputer →

GBHackers Phishing 1d ago

Meta Business Alerts Abused for Phishing Campaigns

Hackers are weaponizing legitimate Meta Business Manager notifications to sneak phishing emails past security filters and into users’ inboxes. By abusing tru...

T1566 T1598 1 IOC

GBHackers →

Help Net Security Phishing Cisco Atlassian GitHub 1d ago

Phishers sneak through using GitHub and Jira’s own mail delivery infrastructure

Attackers are abusing the notification systems of SaaS platforms like GitHub and Jira to send phishing and spam emails, Cisco Talos researchers are warning. ...

T1566 T1598

Help Net Security →

GBHackers Phishing Microsoft 2d ago

EvilTokens Uses Stolen Microsoft 365 Tokens, AI to Supercharge BEC

EvilTokens is a new Phishing-as-a-Service (PhaaS) platform that turns stolen Microsoft 365 tokens and AI into an end‑to‑end factory for Business Email Compro...

T1566 T1598

GBHackers →

GBHackers Phishing 2d ago

Top 10 Best Multi-Factor Authentication (MFA) Providers in 2026

In the digital realm of 2026, the traditional password stands as a flimsy barrier against an onslaught of sophisticated cyber threats. From phishing campaign...

T1566 T1078

GBHackers →

Kaspersky Securelist Phishing Microsoft 2d ago

Financial cyberthreats in 2025 and the outlook for 2026

In this report, Kaspersky experts share their insights into the 2025 financial threat landscape, including regional statistics and trends in phishing, PC mal...

T1566

Kaspersky Securelist →

SC Media Phishing 3d ago

How phishing changed in 2025 and what to expect in 2026 and beyond

Phishing evolves into AI-driven, multi-channel scams abusing trusted platforms.

T1566

SC Media →

Help Net Security Phishing Microsoft Google Mimecast 3d ago

How Mimecast brings enterprise-grade email protection to API deployment

In this Help Net Security video, Andrew Williams, Senior Product Manager at Mimecast, walks through the company’s API-based email security protection for Mic...

T1566 T1598

Help Net Security →

SC Media Phishing 4d ago

Upswell of device code phishing intrusions reported

BleepingComputer reports that device code phishing intrusions have increased by 37.5 times so far this year.

T1566

SC Media →

HackRead Phishing Microsoft 4d ago

Missile Alert Phishing Exploits Iran-US-Israel Conflict for Microsoft Logins

New Phishing scam uses fake missile alerts and the ongoing conflict involving Iran to target users with QR codes and fake government emails to steal Microsof...

T1566

HackRead →

SC Media Phishing 4d ago

Scammers use fake traffic violation texts with QR codes for phishing

This latest scam is a variation of previous toll and parking ticket scams, but instead of links, it features an image of a fake court notice with an embedded...

T1566

SC Media →

SANS ISC Phishing 4d ago

How often are redirects used in phishing in 2026?, (Mon, Apr 6th)

In one of his recent diaries, Johannes discussed how open redirects are actively being sought out by threat actors[1], which made me wonder about how commonl...

T1566

SANS ISC →

BleepingComputer Phishing 5d ago

Traffic violation scams switch to QR codes in new phishing texts

Scammers are sending fake "Notice of Default" traffic violation text messages impersonating state courts across the U.S.

T1566

BleepingComputer →

1 2 3 4 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA