Short Bytes: When one hits a link (anchor tag) on a web page, and it opens in a new browser tab, there are...
PayPal is one of the most used platforms for sending and receiving payments by small medium and large enterprises. This makes it the...
While many financial phishing schemes require development of bank- and region-specific phishing pages, PayPal’s international reach and widespread popularity mean that attackers...
Twitter account verification means your account will get a blue verified badge. Currently, anyone can apply for this verification, yet it depends...
Recently, Gmail users were targeted with a phishing scam, and now it’s time for PayPal since it is undoubtedly one of the most...
Twitter is now the target of a phishing attack that uses methods to trick brand managers and social influencers into fake account...
FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of...
What is a Phishing Scam? Phishing is a form of social engineering approach utilized by hackers to collect sensitive records which include...
Malicious threat actors are using exclusively designed URLs to deceive users into providing their Gmail credentials. This latest phishing campaign, discovered by...
A new highly effective phishing technique targeting Gmail and other services has been gaining popularity during the past year among attackers. Over the...
Short Bytes: Gmail phishing is one of most common methods used by hackers to compromise the online security of naive users. But,...
Rather than using macros, this malware uses Visual Basic Script to avoid detection. Cybercriminals are targeting a US major financial services provider...
Cybercriminals are adopting specially crafted URLs to trick users into entering their Gmail credentials in a new sophisticated phishing campaign. Security experts...
If you have a Netflix account you might be at risk of falling prey to a new phishing scam that targets Netflix users through...
Autofill profiles in browsers are open to phishing vector that permit attackers to gather data from users through the hidden fields, which...
Browser autofill profiles are a reliable phishing vector that allow attackers to collect information from users via hidden fields, which the browser...
Recently, Proofpoint researchers have observed a number of email campaigns with attached password-protected malicious documents. These documents are primarily used to distribute...
Today’s Bitcoin to US Dollar exchange rate has reached $902, the first time Bitcoin price has gone above the $900 mark since...
The Los Angeles County employees have become the victim of a phishing attack and as a result, the data of around 756,000...
Wifiphisher is a security tool that mounts automated victim-customized phishing attacks against WiFi clients in order to obtain credentials or infect the...
The VM comes with various open source tools that have been glued together. The two main components are: PhishingFrenzy (https://github.com/pentestgeek/phishing-frenzy) BeEF (https://github.com/beefproject/beef)...