CloudSEK

Black-Hat SEO Campaign Lures Indian Users Into Visiting Potential Phishing Schemes

In a recent development, analysts at CloudSEK have discovered the much maligned use of black hat Search Engine Poisoning by threat actors, to push Rummy and Investment focused websites to unsuspecting users.

Facilitating Phishing and Pig Butchering Activities Using Zendesk Infrastructure

Dubbed the “Bait & Switch Mode,” the tactic involves registering Zendesk subdomains, integrating phishing pages on those subdomains, and exploiting Zendesk brand trust to bypass email spam filters.

Threat Actors Exploit Brand Collaborations to Target Popular YouTube Channels

The malware, disguised as legitimate documents like contracts or promotional materials, is often delivered through password-protected files hosted on platforms such as OneDrive to evade detection.

Lumma Stealer Malware Campaign Exploits Fake CAPTCHA Pages

The Lumma Stealer malware is being distributed through deceptive human verification pages that trick Windows users into running malicious PowerShell commands, leading to sensitive information theft.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags