
How Misconfigured Email Routing Opens the Door for Credential Theft
Misconfigured email routing creates an opening for attackers using Phishing-as-a-Service platforms like Tycoon2FA to steal credentials. Such tactics enable attackers

Misconfigured email routing creates an opening for attackers using Phishing-as-a-Service platforms like Tycoon2FA to steal credentials. Such tactics enable attackers

In a newly identified cybersecurity threat, attackers are imitating Booking.com to infiltrate European hotels. Employees are manipulated into installing malware

Recent phishing operations exploit Google Cloud Application Integration, sending fake Google emails that deceive users into trusting malicious messages.

Silver Fox targets India, using tax-themed phishing to spread ValleyRAT, including DLL hijacking in attacks.

Grubhub customers received deceptive messages, seemingly from a company email, promising tenfold bitcoin returns. This scam misled users into transferring

Authorities took significant action by seizing a password database used in a phishing attack that attempted a $28 million bank

Three individuals in Nigeria, targeting Microsoft 365 users via Raccoon0365, have been detained. Learn about the phishing-as-a-service method they used.

In October 2025, new phishing attacks by Operation ForumTroll targeted individuals within Russia, shifting focus from organizations previously attacked in

In 2025, phishing threats evolved beyond traditional email to include social platforms, browser-based attacks, and malicious search ads. Security teams

PayPal’s legitimate billing feature becomes a tool for scammers sending fraudulent emails, mimicking genuine purchase notifications. This latest financial scam
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.