The Scattered Lapsus$ Hunters (SLH) cybercrime collective is now actively recruiting women for voice-phishing (vishing) operations, offering high upfront payments…
Read More »multi-factor authentication bypass
A new phishing platform called Starkiller bypasses multi-factor authentication by creating real-time, deceptive replicas of legitimate login pages, marking a…
Read More »A sophisticated phishing campaign is targeting the energy sector using Adversary-in-the-Middle (AiTM) attacks, which bypass standard email filters and multi-factor…
Read More »The "Jingle Thief" cyber campaign targets retailers by exploiting cloud environments using stolen credentials from phishing, bypassing traditional malware and…
Read More »Modern ransomware groups exploit minor security oversights, such as human error and misconfigurations, to bypass multi-factor authentication and disable critical…
Read More »Microsoft and Cloudflare dismantled the RaccoonO365 phishing-as-a-service operation, seizing 338 websites and crippling its infrastructure. The phishing kit bypassed multi-factor…
Read More »




