Phishing is no longer confined to the browser. A fast‑growing tactic—WebDAV malware delivery—leverages legacy behavior in … WebDAV Malware Delivery: How Hackers Exploit Windows File ExplorerRead more
phishing campaigns
Malicious Ads Evade Google Screening Through 1Campaign Cloaking Platform
Digital advertising platforms are trusted channels for reaching audiences—but cybercriminals are increasingly weaponizing them. A new … Malicious Ads Evade Google Screening Through 1Campaign Cloaking PlatformRead more
When MFA Is Abused: OAuth Device Phishing Explained
Modern phishing attacks no longer need stolen passwords—or even multifactor authentication (MFA) bypasses—to succeed. Instead, attackers … When MFA Is Abused: OAuth Device Phishing ExplainedRead more
Massive APT35 Leak Details Iran’s Global Cyber Campaigns
A massive leak of APT35, also known as Charming Kitten, has exposed the inner workings of … Massive APT35 Leak Details Iran’s Global Cyber CampaignsRead more