phishing attack

Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and 3rd-Party Logins
Daniel Kelley | | 2fa, 2FA bypass, Astaroth, bec, credential theft, cybercrime, Cybersecurity, Email Protection, MFA, Microsoft 365, Phishing, phishing attack, Phishing Attacks, phishing kit, phishing kits, reverse proxy, Session hijacking, social engineering, Threat Discovery, two factor authentication
Phishing attacks continue to evolve, pushing even the most secure authentication methods to their limits. First advertised on cybercrime networks in late January 2025, Astaroth is a brand new phishing kit that ...

Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and 3rd-Party Logins
Daniel Kelley | | 2fa, 2FA bypass, Astaroth, bec, credential theft, cybercrime, Cybersecurity, Email Protection, MFA, Microsoft 365, Phishing, phishing attack, Phishing Attacks, phishing kit, phishing kits, reverse proxy, Session hijacking, social engineering, Threat Discovery, two factor authentication
Phishing attacks continue to evolve, pushing even the most secure authentication methods to their limits. First advertised on cybercrime networks in late January 2025, Astaroth is a brand new phishing kit that ...

AWS Seizes Domains Used by Russian Threat Group APT29
Jeffrey Burt | | Amazon Web Services (AWS), APT29, phishing attack, russia hacker, Ukraine cybersecurity
Cloud computing giant AWS, tipped off by Ukrainian security experts, seized domains that were being used by Russian threat group APT29 to send phishing emails to government officials and enterprises that contained ...
Security Boulevard
Ledger Supply Chain Breach: $600,000 Theft Unveiled
Wajahat Raja | | countermeasures, crypto drainer malware, cryptocurrency theft, cybercrime, Cybersecurity News, hardware wallet, ledger, Ledger Connect Kit, Legal Action, NPM account, phishing attack, Proactive Cybersecurity, rogue project, safeguarding cryptocurrency assets, security measures, software wallet, supply chain attack, supply chain breach, technical details, threat actors, unauthorized transactions, virtual assets, WalletConnect
Recent events have brought to light the Ledger supply chain breach, a cybercrime incident that led to the theft of $600,000 in virtual assets. For those who don’t know, Ledger is a ...
Konni Malware Alert: Uncovering The Russian-Language Threat
Wajahat Raja | | APT43, Cyber Espionage, cyber threat intelligence, Cybersecurity News, cybersecurity practices, Cybersecurity Threat, Konni Malware, phishing attack, Remote Access Trojan (RAT), Russian-Language Malware, WinRAR Vulnerability
In the ever-evolving landscape of cybersecurity, a recent discovery sheds light on a new phishing attack being dubbed the Konni malware. This cyber assault employs a Russian-language Microsoft Word document malware delivery ...

Fraud Shifts to Travel, Gaming Sites as Economies Reopen
Nathan Eddy | | account takeover attack, covid-19 fraud, Credential Compromise, Fraud, phishing attack
The prevalence of digital fraud attempts on businesses and consumers continues to rise as malicious actors are shifting their focus in 2021 from financial services to travel and leisure and other industries ...
Security Boulevard

How to Prepare for a Cyberattack
Tim Mackey | | Incident Response, malware attack prevention, phishing attack, software bill of materials, software supply chain
Preventing cyberattacks isn’t easy. If it were, there wouldn’t be a continuous stream of ransomware attacks dominating news feeds, nor would the president of the United States feel compelled to issue executive ...
Security Boulevard

Cryptomining Scam Apps, ‘Stealer’ Trojans Culled from Google Play
There’s a whole lot going on over at the Google Play store. First, Lookout researchers found 170 apps used in cryptomining scams that have snared more than 93,000 victims. Actually, only 25 ...
Security Boulevard

China’s Cybercriminals Profit From Underground Data Monetization
Teri Robinson | | big data, business email compromise, compromised credentials, Data breach, phishing attack
Cybercriminals are using big data technology to make money from data obtained on the Chinese-language underground. Quelle surprise. An analysis of open source information and data drawn from a variety of closed ...
Security Boulevard

3 Cybersecurity Goals for CISOs
If 2020 has taught us anything, it’s that anything can happen. Honestly, how many of us had, “I will do my best to avoid a global pandemic,” as a New Year’s resolution ...
Security Boulevard