Smashing Security podcast #459: This clever scam nearly hijacked a tech CEO’s Apple ID
In episode 459 of Smashing Security, we dive into a chillingly clever account takeover attempt targeting WordPress co-founder Matt Mullenweg - involving MFA ...
Articles mapped to MITRE ATT&CK techniques. Select a technique to view matching articles.
133 articles found
In episode 459 of Smashing Security, we dive into a chillingly clever account takeover attempt targeting WordPress co-founder Matt Mullenweg - involving MFA ...
North Korean threat actors have been observed sending phishing to compromise targets and obtain access to a victim's KakaoTalk desktop application to distrib...
A DART investigation into a Microsoft Teams voice phishing attack shows how deception and trusted tools can enable identity-led intrusions and how to stop th...
The Rapid7 MDR team is currently monitoring an increase in phishing campaigns where threat actors (TAs) impersonate internal IT departments via Microsoft Tea...
Some of these campaigns are linked to Darcula, a Chinese-language phishing-as-a-service platform
A new law enforcement operation against phishing and ransomware operators led to the takedown of 45,000 malicious IP addresses
We are observing an increase of wiper attacks by the Iran-linked Handala Hack group (aka Void Manticore) through phishing and misuse of Microsoft Intune. The...
Following our recent published advisories, this publication is intended to outline a summary of the cyber activities associated with the tension. Based on th...
In a co-ordinated public-private operation between law enforcement agencies and cybersecurity industry partners, Tycoon 2FA - one of the world's most prolifi...
A vulnerability in Cisco Webex could have allowed an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack. Cisco has addressed thi...
Law enforcers and industry partners have taken down notorious phishing-as-a-service platform Tycoon2FA
Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations ...
2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities
Phishing attack mimicking Bitpanda targets users, harvesting credentials and personal information
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse...
A new cybercriminal toolkit uses proxies to mimic popular online services and represents a “significant escalation in phishing infrastructure,” warn research...
New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo
The report contains statistics on spam and phishing in 2025, outlining the main trends: phishing and scam QR codes, ClickFix attacks, ChatGPT subscription lu...
High-volume phishing campaign delivers Phorpiex malware via malicious Windows Shortcut files
Cofense claims AI is making phishing emails more personalized and sophisticated