Cybercriminals are using AI to craft highly convincing phishing scams, from deepfake impersonations to automated attacks, ...
This phishing kit bypasses 2FA via session hijacking and real-time credential theft. Kurt “CyberGuy" Knutsson offers four ways to stay safe from Astaroth phishing attacks.
New research shows that instead of attention-grabbing subject lines, scammers are going with more subtle pitches to get you ...
A newly discovered phishing-as-a-service (PhaaS) operation that researchers call Morphing Meerkat, has been using the DNS ...
DNS intelligence firm Infoblox is tracking the actor behind the PhaaS, the phishing kit, and the related activity under the ...
Scammers are getting more sophisticated. Learn what to look for so you don't fall prey to Apple ID phishing scams.
Chrome vulnerability CVE-2025-2783 was chained with a second exploit for remote code execution in attacks targeting ...
In today’s interconnected world, cyber security threats increasingly target both individuals and organisations, using ...
A well-known (and relatively sophisticated) phishing scheme previously targeting Windows is now being redirected at macOS and ...
After Windows defenses improved, the attackers switched to targeting Mac and Safari users with these very effective scams.
Security firm LayerX Labs has identified a sophisticated phishing campaign that recently began targeting Mac users after new ...