Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and 3rd-Party Logins

Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and 3rd-Party Logins

Phishing attacks continue to evolve, pushing even the most secure authentication methods to their limits. First advertised on cybercrime networks in late January 2025, Astaroth is a brand new phishing kit that ...
Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and 3rd-Party Logins

Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and 3rd-Party Logins

Phishing attacks continue to evolve, pushing even the most secure authentication methods to their limits. First advertised on cybercrime networks in late January 2025, Astaroth is a brand new phishing kit that ...
Russia Microsoft phishing AWS Ukraine

AWS Seizes Domains Used by Russian Threat Group APT29

Cloud computing giant AWS, tipped off by Ukrainian security experts, seized domains that were being used by Russian threat group APT29 to send phishing emails to government officials and enterprises that contained ...
Security Boulevard

Konni Malware Alert: Uncovering The Russian-Language Threat

In the ever-evolving landscape of cybersecurity, a recent discovery sheds light on a new phishing attack being dubbed the Konni malware. This cyber assault employs a Russian-language Microsoft Word document malware delivery ...
online shopping fraud scam BogusBazaar

Fraud Shifts to Travel, Gaming Sites as Economies Reopen

The prevalence of digital fraud attempts on businesses and consumers continues to rise as malicious actors are shifting their focus in 2021 from financial services to travel and leisure and other industries ...
Security Boulevard
Lazarus Andariel Log4j flaw RAT malware

How to Prepare for a Cyberattack

Preventing cyberattacks isn’t easy. If it were, there wouldn’t be a continuous stream of ransomware attacks dominating news feeds, nor would the president of the United States feel compelled to issue executive ...
Security Boulevard
smishing, attack, mobile, devices, phishing, smishing USPS scam

Cryptomining Scam Apps, ‘Stealer’ Trojans Culled from Google Play

There’s a whole lot going on over at the Google Play store. First, Lookout researchers found 170 apps used in cryptomining scams that have snared more than 93,000 victims. Actually, only 25 ...
Security Boulevard
DORA, regulatory, LockBit ransomware DOJ reward

China’s Cybercriminals Profit From Underground Data Monetization

Cybercriminals are using big data technology to make money from data obtained on the Chinese-language underground. Quelle surprise. An analysis of open source information and data drawn from a variety of closed ...
Security Boulevard
hybrid goals

3 Cybersecurity Goals for CISOs

If 2020 has taught us anything, it’s that anything can happen. Honestly, how many of us had, “I will do my best to avoid a global pandemic,” as a New Year’s resolution ...
Security Boulevard