What Is Target Blank Anchor Tag Phishing Attack? How To Prevent It?

Short Bytes: When one hits a link (anchor tag) on a web page, and it opens in a new browser tab, there are chances that a hacker might have taken control over your original tab web page. This is caused because of the absence of an important HTML element attribute rel=”noopener”. And it has some serious performance benefits […]

High-End Phishing Kit Automates Attacks on PayPal Accounts

While many financial phishing schemes require development of bank- and region-specific phishing pages, PayPal’s international reach and widespread popularity mean that attackers can develop phishing pages once and attack in multiple regions. Proofpoint researchers recently encountered a phishing email message that led to what appeared to be a benign PayPal login page. Analysis quickly determined […]

Twitter Users Hit with Blue Badge Verification Phishing Scam

Twitter account verification means your account will get a blue verified badge. Currently, anyone can apply for this verification, yet it depends on the Twitter team to decide whether you will be awarded a blue badge or not. The seekers of the elusive badge have now become the target of cyber criminals who have launched […]

PayPal Users Hit with Account Limited Phishing Scam

Recently, Gmail users were targeted with a phishing scam, and now it’s time for PayPal since it is undoubtedly one of the most used online payment systems in the world making it a perfect target for cybercriminals. Eset, a cybersecurity firm, has discovered a phishing scam targeting PayPal users to steal their login credentials. In this scam, […]

Twitter Verify Account Phishing Scam Steals Credentials, Credit Card Data

Twitter is now the target of a phishing attack that uses methods to trick brand managers and social influencers into fake account verification. Security firm Proofpoint discovered the phishing attack, which places ads on websites and lures brand managers to false verification pages. The ads come from an account that copies the official Twitter support […]

FiercePhish – Phishing Framework To Manage All Phishing Engagements

FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more. The features will continue to be expanded and will include website spoofing, click tracking, and extensive notification options.   Note: This tool is used only for educational purpose. We […]

Learn How to Identify And Avoid Phishing Scams

What is a Phishing Scam? Phishing is a form of social engineering approach utilized by hackers to collect sensitive records which include usernames, passwords and credit card details through posing as a sincere individual or business enterprise. considering the fact that most on line users are ignorant of the techniques used in wearing out a […]

Gmail Phishing Scam Stealing Credentials Through Infected Attachment

Malicious threat actors are using exclusively designed URLs to deceive users into providing their Gmail credentials. This latest phishing campaign, discovered by security experts, utilizes a very effective phishing attack that can trick even the most alerted users and tech-savvy people. The campaign involves sending infected messages to the contacts from an already infected computer. […]

Beware : Highly Sophisticated Gmail Phishing Attack Targeting Many Gmail Users

A new highly effective phishing technique targeting Gmail and other services has been gaining popularity during the past year among attackers. Over the past few weeks there have been reports of experienced technical users being hit by this. This attack is currently being used to target Gmail customers and is also targeting other services. The way the attack works […]

Beware! This Is The Smartest Gmail Phishing Attack You’ll Ever Encounter

Short Bytes: Gmail phishing is one of most common methods used by hackers to compromise the online security of naive users. But, a recent Gmail phishing attack, uncovered by Wordfence, mimics your past conversations and attachments, succeeding in fooling even the tech-savvy netizens. To counter this attack, users should make sure to verify the https:// protocol and […]

This phishing email uses an unexpected trick to infect PCs with keylogger malware

Rather than using macros, this malware uses Visual Basic Script to avoid detection. Cybercriminals are targeting a US major financial services provider with malicious emails containing the tools required to install information collecting keylogging software onto the infected systems. Keylogging enables hackers to see everything that’s typed using the keyboard of an infected machine, something […]

Insidious phishing attack leverages on fake attachments to steal Gmail credentials

Cybercriminals are adopting specially crafted URLs to trick users into entering their Gmail credentials in a new sophisticated phishing campaign. Security experts discovered a new effective Gmail phishing attack that is able to deceive also tech-savvy people. Crooks leverage on specially crafted URLs to trick victims into providing their Gmail credentials on a phishing page. The malicious messages are sent […]

Netflix Users Targeted with yet another sophisticated Phishing Scam

If you have a Netflix account you might be at risk of falling prey to a new phishing scam that targets Netflix users through emails. These emails contain a fake login screen of Netflix and ask for the login information. If the user enters the login information, the scammers ask for the credit card details. Fake Netflix […]

Browser Autofill Profiles are Open for Phishing Attacks

Autofill profiles in browsers are open to phishing vector that permit attackers to gather data from users through the hidden fields, which the browsers consequently loads with preset individual data and which the user unwittingly sends to the attacker when he submits a form. These autofill profiles are the latest addition to modern browsers used […]

Browser Autofill Profiles Can Be Abused for Phishing Attacks

Browser autofill profiles are a reliable phishing vector that allow attackers to collect information from users via hidden fields, which the browser automatically fills with preset personal information and which the user unknowingly sends to the attacker when he submits a form. Autofill profiles are a recent addition to modern-day browsers. This feature works by […]

Phishing Actors Take a Cue From Malware-Distributing Brethren

Recently, Proofpoint researchers have observed a number of email campaigns with attached password-protected malicious documents. These documents are primarily used to distribute malware including Cerber ransomware and the Ursnif banking Trojan, with document passwords included in the body of the email. The use of password-protected documents makes them difficult to execute in automated sandbox environments, […]

As Bitcoin Price Surges, Phishing Attacks on Cryptocurrency Wallets Intensify

Today’s Bitcoin to US Dollar exchange rate has reached $902, the first time Bitcoin price has gone above the $900 mark since January 2014, almost three years ago. Nobody knows what’s driving this sudden surge of Bitcoin popularity, but cyber-criminals won’t bother looking into macroeconomic factors when deciding that the market is ripe and ready […]

WiFiPhisher – Automated Phishing Attacks Against Wi-Fi Clients

Wifiphisher is a security tool that mounts automated victim-customized phishing attacks against WiFi clients in order to obtain credentials or infect the victims with malwares. It is primarily a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining credentials from captive portals and […]