iCloud Calendar abused to send phishing emails from Apple’s servers
(bleepingcomputer.com)
121.
122.
6 browser-based attacks all security teams should be ready for in 2025
(bleepingcomputer.com)
123.
124.
125.
Google debunks claims of major Gmail security alert
(androidauthority.com)
126.
AI website builder Lovable increasingly abused for malicious activity
(bleepingcomputer.com)
127.
Hackers steal Microsoft logins using legitimate ADFS redirects
(bleepingcomputer.com)
128.
Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump’ Cashout Scheme
(krebsonsecurity.com)
129.
Booking.com phishing campaign uses sneaky 'ん' character to trick you
(bleepingcomputer.com)
130.
New downgrade attack can bypass FIDO auth in Microsoft Entra ID
(bleepingcomputer.com)
131.
New downgrade attack can bypass FIDO auth in Microsoft Entra ID
(news.ycombinator.com)
132.
The Rise of Native Phishing: Microsoft 365 Apps Abused in Attacks
(bleepingcomputer.com)
133.
Galaxy phones will soon gain voice phishing detection with One UI 8
(androidauthority.com)
134.
Mozilla warns of phishing attacks targeting add-on developers
(bleepingcomputer.com)
135.
Attackers exploit link-wrapping services to steal Microsoft 365 logins
(bleepingcomputer.com)
136.
Hackers target Python devs in phishing attacks using fake PyPI site
(bleepingcomputer.com)
137.
How attackers are still phishing "phishing-resistant" authentication
(bleepingcomputer.com)
138.
Threat actors downgrade FIDO2 MFA auth in PoisonSeed phishing attack
(bleepingcomputer.com)
139.
140.
Beyond the Hook: A Technical Deep Dive into Modern Phishing Methodologies
(news.ycombinator.com)
141.
Trezor’s support platform abused in crypto theft phishing attacks
(bleepingcomputer.com)
143.
ChainLink Phishing: How Trusted Domains Become Threat Vectors
(bleepingcomputer.com)
144.
Darcula PhaaS can now auto-generate phishing kits for any brand
(bleepingcomputer.com)