Perception Point

Evasive ZIP File Concatenation Used to Deploy Trojan Targeting Windows Users

According to Perception Point, hackers are increasingly using a technique called ZIP file concatenation to hide malicious payloads in compressed archives in a way that security solutions might miss.

Rising Abuse of URL Rewriting in Phishing

The abuse of URL rewriting in phishing attacks has emerged as a new trend, allowing threat actors to hide malicious links behind trusted domains of security vendors. Exploiting these features enables bypassing detection mechanisms.

Microsoft Two-Step Phishing Campaign Targets LinkedIn Users

A new LinkedIn threat combines breached users’ accounts and an evasive 2-step phishing attack. A recent Python-based infostealer called Snake targets Facebook users with malicious messages.

New and Evasive Method Delivers NetSupport RAT in Operation PhantomBlu

A new phishing campaign called Operation PhantomBlu is using sophisticated social engineering tactics to deploy the NetSupport RAT remote access trojan, showcasing innovation in evasion techniques.

Hackers Using Weaponized Invoice To Deliver LUMMA Malware

Cybersecurity analysts identified that the attacker, posing as a financial services company in this campaign, tricks the target with a fake invoice email. The attacker dodges detection using a fake page and a real link.

Booking.com Customers Hit by Phishing Campaign Delivered Via Compromised Hotels Accounts

The phishing attacks are highly convincing, using personalized messages and a meticulously crafted phishing page that mimics the Booking.com interface, leading victims to unknowingly provide their credit card or bank information.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags