FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Phishing

20 articles

BleepingComputer Phishing NEW 1h ago

Device code phishing attacks surge 37x as new kits spread online

Device code phishing attacks that abuse the OAuth 2.0 Device Authorization Grant flow to hijack accounts have surged more than 37 times this year.

T1566

BleepingComputer →

SC Media Phishing Microsoft 1d ago

Global Microsoft device code phishing facilitated by novel EvilTokens kit

BleepingComputer reports that organizations around the world, particularly in the U.S.

T1566

SC Media →

GBHackers Phishing Microsoft 2d ago

Remcos RAT Attack Uses Obfuscated Scripts, Trusted Windows Tools

Remcos RAT operators are abusing obfuscated scripts and trusted Windows binaries to deliver a stealthy, largely fileless infection chain that runs almost ent...

T1566

GBHackers →

BleepingComputer Phishing Microsoft 2d ago

New EvilTokens service fuels Microsoft device code phishing attacks

A new malicious kit called EvilTokens integrates device code phishing capabilities, allowing attackers to hijack Microsoft accounts and provide advanced feat...

T1566 T1598

BleepingComputer →

HackRead Phishing 2d ago

LinkedIn Phishing Scam Uses Fake Notifications to Hijack Accounts

A LinkedIn phishing scam uses fake notifications and lookalike domains to steal credentials, hijack accounts, and access sensitive professional data.

T1566

HackRead →

HackRead Phishing 2d ago

LinkedIn Phishing Scam Uses Fake Notifications to Hijack Accounts

A LinkedIn phishing scam uses fake notifications and lookalike domains to steal credentials, hijack accounts, and access sensitive professional data.

T1566

HackRead →

CSO Online Phishing 3d ago

Security awareness is not a control: Rethinking human risk in enterprise security

Organizations have been responding to phishing, business email compromise, and credential theft in essentially the same manner for over ten years. They essen...

T1566 T1078 T1598

CSO Online →

SC Media Phishing Microsoft 3d ago

Illicit LNK files deploy Russian CTRL toolkit

Illicit LNK files deploy Russian CTRL toolkit The Hacker News reports that malicious Windows LNK files masquerading as private key folders have been tapped t...

T1566 T1598

SC Media →

Help Net Security Phishing Microsoft 4d ago

EvilTokens ramps up device code phishing targeting Microsoft 365 users

Security researchers report a notable increase in device code phishing activity aimed at Microsoft 365 users, and have attributed this rise to the availabili...

T1566

Help Net Security →

Help Net Security Phishing Apple 4d ago

Apple counters ClickFix attacks with macOS Terminal warning

Apple has added a new security feature in macOS Tahoe 26.4 that warns users before they enter commands in Terminal that could cause harm.

T1566 T1204

Help Net Security →

GBHackers Phishing Microsoft 4d ago

EvilTokens Launches New Phishing Service Targeting Microsoft Accounts

EvilTokens is a new Phishing-as-a-Service (PhaaS) platform that industrialises Microsoft account takeover by abusing the OAuth device code flow rather than t...

T1566 T1598

GBHackers →

GBHackers Phishing 4d ago

Tax Filing Scams Used to Deliver Malware in New Cybercrime Campaigns

Cybercriminals are once again exploiting global tax seasons, abusing IRS and tax filing lures to deliver malware, remote monitoring and management (RMM) tool...

T1566 T1598

GBHackers →

The Hacker News Phishing Microsoft 5d ago

Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels

Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that's distributed via malicious Windows shortcut (LNK) files that are di...

T1566 T1598

The Hacker News →

GBHackers Phishing Mar 27

Phishing ZIP Files Used to Deploy PXA Stealer Targeting Financial Firms

A sharp rise in PXA Stealer campaigns targeting global financial institutions during the first quarter of 2026. The activity marks a notable shift in the inf...

T1566

GBHackers →

SC Media Phishing Microsoft Mar 26

Microsoft credential phishing weaponizes Bubble AI app builder

Microsoft credential phishing weaponizes Bubble AI app builder AI-powered no-code app-building platform Bubble has been exploited to create illicit web apps ...

T1566 T1598

SC Media →

SC Media Phishing Mar 26

IronScales' Eyal Benishti on why AI made 'solved' attacks dangerous again

Eyal Benishti explores what Phishing 3.0 really means for security leaders.

T1566

SC Media →

BleepingComputer Phishing Microsoft Mar 25

Bubble AI app builder abused to steal Microsoft account credentials

Threat actors are evading phishing detection in campaigns targeting Microsoft accounts by abusing the no-code app-building platform Bubble to generate and ho...

T1566

BleepingComputer →

CSO Online Phishing Mar 25

6 key trends reshaping the IAM market

The identity and access management (IAM) market has shifted its focus from traditional “login and MFA” mechanisms toward treating identity as a security cont...

T1566

CSO Online →

Infosecurity Magazine Phishing SAP Mar 24

Silver Fox Cyber Campaigns Show Shift Toward Dual Espionage

Silver Fox pivots from ValleyRAT tax lures to WhatsApp‑style stealers, blending espionage & phishing

T1566

Infosecurity Magazine →

BleepingComputer Phishing Mar 23

Tycoon2FA phishing platform returns after recent police disruption

The Tycoon2FA phishing-as-a-service (PhaaS) platform that Europol and partners disrupted on March 4 has already returned to previously observed activity leve...

T1566

BleepingComputer →

1 2 3 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA