How attackers are still phishing "phishing-resistant" authentication
(bleepingcomputer.com)
121.
122.
Threat actors downgrade FIDO2 MFA auth in PoisonSeed phishing attack
(bleepingcomputer.com)
123.
124.
Beyond the Hook: A Technical Deep Dive into Modern Phishing Methodologies
(news.ycombinator.com)
125.
Trezor’s support platform abused in crypto theft phishing attacks
(bleepingcomputer.com)
127.
ChainLink Phishing: How Trusted Domains Become Threat Vectors
(bleepingcomputer.com)
128.
Darcula PhaaS can now auto-generate phishing kits for any brand
(bleepingcomputer.com)