Articles tagged with: #phishing Clear filter
Threat Actors Behind WARMCOOKIE Malware Added New Features to It's Arsenal

Threat Actors Behind WARMCOOKIE Malware Added New Features to It's Arsenal

Cyber Security News cybersecuritynews.com

The WARMCOOKIE backdoor first surfaced in mid-2024, delivered primarily via recruiting-themed phishing campaigns that coaxed victims into executing malicious documents. Initially designed as a lightweight implant for remote command execution, its modular codebase enabled rapid adaptation to new objectives. Over the past year, targets have included enterprise networks across multiple regions, with operators exploiting malvertising

Need help: Safe Links/Attachments skewing Mimecast phishing-sim clicks (AU tenants)

Need help: Safe Links/Attachments skewing Mimecast phishing-sim clicks (AU tenants)

cybersecurity www.reddit.com

I'm running user awareness phishing simulations in Mimecast for several Australian clients, but my Mimecast click reports still show Microsoft IPs (Safe Links/Attachments) instead of real user IPs. That makes it impossible to tell which clicks and credential submissions are genuine user interactions versus scanner activity. From the Microsoft Defender side, I've already done the usual: set up Advanced Delivery for the simulation senders/domains, added Mimecast AU IP ranges and domains there,...

Phishing from Home  -  The Hidden Danger in Remote Jobs Lurking in Tesla, Google, Ferrari, and Glassdoor

Phishing from Home - The Hidden Danger in Remote Jobs Lurking in Tesla, Google, Ferrari, and Glassdoor

Cofense cofense.com

In Q3 2024, the Cofense Phishing Defense Center (PDC) identified a phishing campaign that impersonated several Fortune 500 companies by targeting individuals in social media and marketing positions through fake job applications. Earlier this year, the team researched how resume details have become valuable tools for threat actors in a blog titled " Job Application Spear Phishing ." Since then, the PDC has continued to monitor the use of this tactic by threat actors who have begun utilizing...

Best antivirus for Windows setups where phishing is the main attack vector?

Best antivirus for Windows setups where phishing is the main attack vector?

cybersecurity www.reddit.com

I'm curious how cybersecurity pros handle phishing protection on personal or small business Windows environments. Most end users I've seen rely on Defender and call it a day, but phishing still seems to slip through even when the OS is fully patched and SmartScreen is active. Is layering a third-party antivirus still considered worthwhile for phishing-focused threats, or are browser-level and email gateway filters more effective these days? Also interested in how you balance usability with...

WhatsApp Targeted By Fast-Spreading Malware Campaign

WhatsApp Targeted By Fast-Spreading Malware Campaign

cybersecurity www.reddit.com

A new malware campaign is using WhatsApp as both a lure and a launchpad. First seen in September 2025, the self-propagating malware known as SORVEPOTEL spreads through phishing messages that contain malicious ZIP files disguised as receipts or budgets. How it works: Victim opens the ZIP, which contains a hidden Windows shortcut. The shortcut executes an encoded PowerShell command. This downloads additional payloads, establishes persistence, and connects to attacker-controlled servers. The...

New Android Spyware Attacking Android Users Mimic as Signal and ToTok Apps

New Android Spyware Attacking Android Users Mimic as Signal and ToTok Apps

Cyber Security News cybersecuritynews.com

In recent months, security teams have observed a surge in Android spyware campaigns that prey on privacy-conscious users by masquerading as trusted messaging apps. These malicious payloads exploit users' trust in Signal and ToTok, delivering trojanized applications that request extensive permissions under the guise of enhanced functionality. Initial distribution relies on phishing websites and fake

Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT

Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT

Cyber Security News cybersecuritynews.com

In recent months, a sophisticated campaign dubbed Cavalry Werewolf has emerged, targeting government and critical infrastructure organizations across Russia and neighboring regions. Adversaries initiated these attacks by sending meticulously crafted phishing emails that impersonate officials from Kyrgyz government agencies. These emails contain malicious RAR archives, which deploy a suite of custom tools, including the FoalShell

Top 10 Best Digital Footprint Monitoring Tools For Organizations in 2025

Top 10 Best Digital Footprint Monitoring Tools For Organizations in 2025

Cyber Security News cybersecuritynews.com

In today's hyperconnected digital environment, organizations face increasing threats to their online presence and reputations. From cyberattacks and phishing campaigns to data breaches and brand impersonation, businesses must actively safeguard their digital footprint. Digital footprint monitoring tools are designed to provide organizations with deep insights into risk exposure across surface web, deep web, and dark

SideWinder Hacker Group Hosting Fake Outlook/Zimbra Portals to Steal Login Credentials

SideWinder Hacker Group Hosting Fake Outlook/Zimbra Portals to Steal Login Credentials

Cyber Security News cybersecuritynews.com

APT SideWinder, a state-sponsored threat actor long associated with espionage across South Asia, has recently launched a campaign deploying phishing portals that mimic legitimate Outlook and Zimbra webmail services. Emerging in mid-2025, this operation uses free hosting platforms such as Netlify, pages.dev, and workers.dev to serve fake login pages tailored to government and military targets

Threat Actors Leveraging WhatsApp Messages to Attack Windows Systems With SORVEPOTEL Malware

Threat Actors Leveraging WhatsApp Messages to Attack Windows Systems With SORVEPOTEL Malware

Cyber Security News cybersecuritynews.com

Enterprise networks worldwide are facing an aggressive, self-propagating malware campaign that exploits WhatsApp as its primary delivery mechanism. First observed in early September 2025 targeting Brazilian organizations, SORVEPOTEL spreads through convincing phishing messages carrying malicious ZIP attachments. Upon execution, the malware not only establishes a foothold on the host system but also hijacks active WhatsApp

New 'Point-and-Click' Phishing Kit Bypasses User Awareness and Security Filters to Deliver Malicious Payloads

New 'Point-and-Click' Phishing Kit Bypasses User Awareness and Security Filters to Deliver Malicious Payloads

Cyber Security News cybersecuritynews.com

A novel phishing kit has surfaced that enables threat actors to craft sophisticated lures with minimal technical expertise. This "point-and-click" toolkit combines an intuitive web interface with powerful payload delivery mechanisms. Attackers can select from preconfigured templates, customize branding elements, and target specific organizations or individuals. Once a phishing page is deployed, victims are presented

Top 10 Best Account Takeover Protection Tools in 2025

Top 10 Best Account Takeover Protection Tools in 2025

Cyber Security News cybersecuritynews.com

Account Takeover (ATO) attacks have become one of the most pressing security concerns for businesses in 2025. With the rise of credential stuffing, phishing, brute force attacks, and bot-driven fraud, organizations must reinforce their digital defenses. Account takeover can lead to stolen customer data, financial losses, trust damage, and regulatory consequences. Protecting online accounts is

Threat Actors Mimic Popular Brands to Deceive Users and Deploy Malware in New Wave of Attacks

Threat Actors Mimic Popular Brands to Deceive Users and Deploy Malware in New Wave of Attacks

Cyber Security News cybersecuritynews.com

Cybercriminals have launched a sophisticated campaign that leverages brand impersonation techniques to distribute malware through deceptive SMS phishing (smishing) attacks. This emerging threat demonstrates an evolution in social engineering tactics, where attackers strategically craft URLs containing trusted brand names to bypass user skepticism and security filters. The attack methodology centers on manipulating URL structures to

Top 10 Best Brand Protection Solutions for Enterprises in 2025

Top 10 Best Brand Protection Solutions for Enterprises in 2025

Cyber Security News cybersecuritynews.com

Brand protection solutions are essential for enterprises in 2025 as digital commerce continues to grow and online threats evolve more rapidly than ever. With the surge in counterfeit products, trademark infringements, phishing attacks, and reputation risks, enterprises must safeguard their intellectual property and digital assets. Choosing the right brand protection tool not only builds consumer

Top 10 Best Digital Risk Protection (DRP) Platforms in 2025

Top 10 Best Digital Risk Protection (DRP) Platforms in 2025

Cyber Security News cybersecuritynews.com

In 2025, businesses are facing unprecedented challenges in the digital risk landscape. With cyber threats evolving rapidly, organizations need advanced solutions to detect, assess, and mitigate risks originating outside traditional network perimeters. Digital Risk Protection (DRP) platforms offer proactive visibility into threats such as brand impersonation, data leaks, phishing attacks, and cybercrime activities that could