
EvilTokens Kit Uses Device Code Phishing to Target Microsoft Accounts
Explore how EvilTokens exploits phishing methods to endanger Microsoft accounts and facilitate business email compromise attacks.

Explore how EvilTokens exploits phishing methods to endanger Microsoft accounts and facilitate business email compromise attacks.

Ukrainian CERT is impersonated in a phishing campaign that distributes AGEWHEEZE, a remote administration tool.

Cybercriminals use phishing tactics to hijack TikTok business accounts.

French-speaking companies face phishing scams hiding crypto miners and data thieves in fake resumes.

LeakNet ransomware integrates ClickFix for access, shifting from traditional entry strategies.

Intuitive’s internal systems hit by phishing attack; patient operations remain unaffected.

Cyberattack on Signal and WhatsApp targets high-profile German officials, including former BND VP, using impersonation tactics.

A phishing attack involved DKIM-signed emails, trusted infrastructures, and Cloudflare protection against a security firm executive.

Russian hackers target Ukrainian entities using fresh malware BadPaw and MeowMeow delivered through phishing.

Flare reveals the booming underground market for hacked cPanel credentials fueling phishing schemes.
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.