|
You are here |
hunt.io | ||
| | | | |
cocomelonc.github.io
|
|
| | | | | [AI summary] The text describes a sophisticated phishing campaign using multiple exfiltration methods and professional social engineering tactics. It highlights the use of legitimate services like Telegram API and Firebase for malicious purposes, demonstrating advanced evasion techniques. The text also discusses the use of tLab Anti-APT for analyzing and detecting such attacks through automated methods like OCR, email fuzzing, and correlation analysis. | |
| | | | |
blog.polyswarm.io
|
|
| | | | | CastleLoader, a versatile malware loader, has infected 469 devices since May 2025, leveraging Cloudflare-themed ClickFix phishing and fake GitHub repositories to deliver information stealers and RATs. | |
| | | | |
blog.talosintelligence.com
|
|
| | | | | * Cisco Talos has observed an unknown threat actor conducting a phishing campaign targeting Facebook business and advertising account users in Taiwan. * The decoy email and fake PDF filenames are designed to impersonate a company's legal department, attempting to lure the victim into downloading and executing malware. * This campaign abuses Google's | |
| | | | |
thehackernews.com
|
|
| | | A critical vulnerability (CVE-2024-3400) in Palo Alto Networks PAN-OS is being actively exploited by threat actors. | ||