Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA
A new cybercriminal toolkit uses proxies to mimic popular online services and represents a “significant escalation in phishing infrastructure,” warn research...
Articles mapped to MITRE ATT&CK techniques. Select a technique to view matching articles.
98 articles found
A new cybercriminal toolkit uses proxies to mimic popular online services and represents a “significant escalation in phishing infrastructure,” warn research...
New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo
The report contains statistics on spam and phishing in 2025, outlining the main trends: phishing and scam QR codes, ClickFix attacks, ChatGPT subscription lu...
High-volume phishing campaign delivers Phorpiex malware via malicious Windows Shortcut files
Cofense claims AI is making phishing emails more personalized and sophisticated
Multi-stage attack begins with fake message relating to business requests and evades detection with link hidden in a PDF
Introduction Mandiant has identified an expansion in threat activity that uses tactics, techniques, and procedures (TTPs) consistent with prior ShinyHunters-...
Introduction Mandiant is tracking a significant expansion and escalation in the operations of threat clusters associated with ShinyHunters-branded extortion.
Threat actors posing as IT support teams use phishing kits to generate fake login sites in real-time to trick victims into handing over credentials
Phoney email alerts suggest users need to backup their LastPass accounts within 24 hours.
Cyber risks for the Milano-Cortina 2026 Winter Games include phishing and spoofed websites as key threat vectors
Loan phishing operation in Peru is stealing card info by impersonating financial institutions
Cybersecurity Researchers at ReliaQuest warn of an ongoing campaign delivered to “high-value individuals” via LinkedIn messages
Discover how Russia’s BlueDelta targets UKR.NET users with advanced credential-harvesting campaigns, evolving tradecraft, and multi-stage phishing techniques.
Identity is effectively the new network boundary. It must be protected at all costs.
Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”. Here’s what to know about it.
The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds
Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.