cofense

Phishing Campaign Impersonates Apple Pay and Yahoo to Steal Credentials and Financial Data

A sophisticated phishing campaign is targeting Apple Pay and Yahoo users. It leverages realistic email and web page impersonations to steal sensitive credentials, financial data, and personal information.

Using Blob URLs to Bypass SEGs and Evade Analysis

Threat actors are increasingly leveraging blob URIs (Uniform Resource Identifiers) to deliver credential phishing pages that bypass Secure Email Gateways (SEGs) and evade automated analysis.

Precision-Validated Phishing: A New Threat to Defenders​

A new phishing tactic known as Precision-Validated Phishing is being leveraged by cybercriminals to enhance the effectiveness of credential theft campaigns. This technique uses real-time email validation.

Streaming Services: A New Front for Cybersecurity Threats

A recent phishing campaign has been uncovered targeting Spotify users through a spoofed email that mimics official Spotify communications. The attackers embedded legitimate Spotify URLs within the email to lend credibility.

HR-Themed Phishing Exploits Q1 Evaluations: Stay Alert

A recent phishing campaign exploits the timing of Q1 evaluations by impersonating internal HR communications to deceive employees. The campaign culminates in credential theft via a spoofed Microsoft login page.

Decoding Fake US ESTA Emails: Scam or Real Deal?

A sophisticated phishing campaign is targeting individuals seeking U.S. travel authorization by impersonating the U.S. Customs and Border Protection (CBP) and the Electronic System for Travel Authorization (ESTA).

Double-Edged Email Attacks: Phishing & Malware Tactics​

A recent phishing campaign leverages a dual-threat strategy combining credential harvesting and malware delivery. Disguised as a file deletion alert, the attack exploits user trust to deploy the ConnectWise RAT or steal Office365 credentials.

Threat Actors Abuse Trust in Cloud Collaboration Platforms

Researchers at Cofense warned of a growing number of phishing campaigns leveraging trusted online document platforms, such as Adobe, DocuSign, Dropbox, Canva, and Zoho, to evade secure email gateways (SEGs) and steal credentials.

Microsoft Copilot Spoofing Emerges as a New Phishing Vector

A new phishing campaign exploited Microsoft Copilot's novelty by sending emails with spoofed invoices. These emails direct users to fake login pages that capture credentials, enhanced by Microsoft branding and a counterfeit MFA page.

OAuth Phishing Alert: Fake 'Adobe Drive X' App Abusing Microsoft Login

Threat actors have taken phishing to the next level by weaponizing custom Microsoft 365 applications to request sensitive information from users. User is taken to a legitimate Microsoft authentication page, making the phishing attack more convincing.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags