Microsoft: Hackers target universities in “payroll pirate” attacks
(bleepingcomputer.com)
91.
92.
Cybersecurity training programs don't prevent phishing scams
(news.ycombinator.com)
93.
Cybersecurity Training Programs Don't Prevent Phishing Scams
(news.ycombinator.com)
94.
98.
PyPI urges users to reset credentials after new phishing attacks
(bleepingcomputer.com)
99.
Why attackers are moving beyond email-based phishing attacks
(bleepingcomputer.com)
100.
101.
Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service
(bleepingcomputer.com)
102.
New VoidProxy phishing service targets Microsoft 365, Google accounts
(bleepingcomputer.com)
103.
104.
Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack
(bleepingcomputer.com)
105.
iCloud Calendar abused to send phishing emails from Apple’s servers
(bleepingcomputer.com)
106.
6 browser-based attacks all security teams should be ready for in 2025
(bleepingcomputer.com)
107.
108.
109.
Google debunks claims of major Gmail security alert
(androidauthority.com)
110.
AI website builder Lovable increasingly abused for malicious activity
(bleepingcomputer.com)
111.
Hackers steal Microsoft logins using legitimate ADFS redirects
(bleepingcomputer.com)
112.
Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump’ Cashout Scheme
(krebsonsecurity.com)
113.
Booking.com phishing campaign uses sneaky 'ん' character to trick you
(bleepingcomputer.com)
114.
New downgrade attack can bypass FIDO auth in Microsoft Entra ID
(bleepingcomputer.com)
115.
New downgrade attack can bypass FIDO auth in Microsoft Entra ID
(news.ycombinator.com)
116.
The Rise of Native Phishing: Microsoft 365 Apps Abused in Attacks
(bleepingcomputer.com)
117.
Galaxy phones will soon gain voice phishing detection with One UI 8
(androidauthority.com)
118.
Mozilla warns of phishing attacks targeting add-on developers
(bleepingcomputer.com)
119.
Attackers exploit link-wrapping services to steal Microsoft 365 logins
(bleepingcomputer.com)
120.
Hackers target Python devs in phishing attacks using fake PyPI site
(bleepingcomputer.com)