Using Blob URLs to Bypass SEGs and Evade Analysis

Using Blob URLs to Bypass SEGs and Evade Analysis

Starting in mid-2022, Cofense Intelligence detected a new technique for successfully delivering a credential phishing page to a user’s inbox: blob URIs (Uniform Resource Identifier).  ...
Spain and Portugal Power Outages Spark a Surge in Phishing Attacks

Spain and Portugal Power Outages Spark a Surge in Phishing Attacks

Spain & Portugal Power Outages Spark a Surge in Phishing Attacks ...
Custom-Crafted, Qantas-Spoofing Emails Target Australian Victims

Custom-Crafted, Qantas-Spoofing Emails Target Australian Victims

Custom-Crafted, Qantas-Spoofing Emails Target Australian Victims ...
Custom-Crafted, Qantas-Spoofing Emails Target Australian Victims

Custom-Crafted, Qantas-Spoofing Emails Target Australian Victims

Custom-Crafted, Qantas-Spoofing Emails Target Australian Victims ...
The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders

The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders

The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders ...
The Rise of XWorm RAT: What Cybersecurity Teams Need to Know Now

The Rise of XWorm RAT: What Cybersecurity Teams Need to Know Now

The Rise of XWorm RAT: What Cybersecurity Teams Need to Know Now ...
Microsoft Copilot Spoofing: A New Phishing Vector

Microsoft Copilot Spoofing: A New Phishing Vector

Microsoft Copilot Spoofing: A New Phishing Vector ...
LinkedIn InMail-Spoofing Email Delivers ConnectWise RAT

LinkedIn InMail-Spoofing Email Delivers ConnectWise RAT

The Cofense Phishing Defense Center (PDC) and Cofense Intelligence recently identified a LinkedIn-spoofing malware campaign delivering ConnectWise RAT ...
Amazon Phish Hunts for Security Answers and Payment Information

Amazon Phish Hunts for Security Answers and Payment Information

Amazon Phish Hunts for Security Answers and Payment Information ...
When Data Tools Become Dangerous: MS Power BI Links Used in Phishing Campaigns

When Data Tools Become Dangerous: MS Power BI Links Used in Phishing Campaigns

When Data Tools Become Dangerous: MS Power BI Links Used in Phishing Campaigns ...