This phishing kit bypasses 2FA via session hijacking and real-time credential theft. Kurt “CyberGuy" Knutsson offers four ...
New research shows that instead of attention-grabbing subject lines, scammers are going with more subtle pitches to get you ...
Though the term smishing comes from a combination of the words phishing and SMS, these scams can also be conducted through ...
A phishing-as-a-service (PhaaS) platform named 'Lucid' has been targeting 169 entities in 88 countries using well-crafted ...
Cybercriminals are using AI to craft highly convincing phishing scams, from deepfake impersonations to automated attacks, ...
A new attack targeting Microsoft Teams users used vishing, remote access tools and DLL sideloading to deploy a JavaScript ...
Explore more
Cybercriminals are switching up tactics for their social engineering trickery to increase authenticity, better bypass filters ...
A newly discovered phishing-as-a-service (PhaaS) operation that researchers call Morphing Meerkat, has been using the DNS ...
Hackers are targeting Mac users with a nefarious new phishing scam that employs clever tricks to steal your data. Here’s how ...
The hacker behind the $9.6 million zkLend exploit lost all stolen ETH in a phishing scam, mistakenly sending it to a fake ...
Unlike traditional filters that analyze metadata, AI models analyze the full context and semantics of an email, allowing them ...
Security firm LayerX Labs has identified a sophisticated phishing campaign that recently began targeting Mac users after new ...