🏷️ #phishing

12 threads tagged with “phishing

📊 LOWMobile Security

Google: Android Outperforms iOS in Mobile Scam Protection

Google published research showing Android's AI-driven scam protections outperform iOS. What's interesting: YouGov survey of 5,000 users found Android users 58% more likely to report zero scam texts vs…

Category: Research & Analysis / Mobile Security

#mobile-security#android#ios#scam-protection#ai-security#phishing#google
🔴 HIGHPhishing & Espionage Campaigns

PhantomCaptcha Campaign Targets Ukraine Relief Organizations

SentinelLabs uncovered the PhantomCaptcha campaign targeting humanitarian and government organizations involved in Ukraine relief efforts. Attackers impersonated the Ukrainian President’s Office using…

Category: Threat Alerts / Threat Intelligence / Phishing & Espionage Campaigns

#APT#Ukraine#phishing#SentinelLabs#espionage
⚠️ MEDIUMThreat Intelligence

Outage Opportunists: Phishing Risks During AWS Downtime

Cofense warns that major outages—such as AWS disruptions—are routinely exploited for phishing, spoofed helpdesks, QR scams, and fake patch downloads. Case studies from 2024–2025 show rapid lure adapta…

Category: Threat Alerts / Threat Intelligence / Threat Intelligence

#aws#outage#phishing#qr#mfa-fatigue
⚠️ MEDIUMBusiness & Industry Impact

The Rise of AI-Powered Cyberattacks: Is BFSI Ready?

Cyber Defense Magazine examines AI‑enabled threats against India’s BFSI sector, citing surges in phishing (+175%), deepfake fraud (+550% since 2019), and high breach costs (US$6.08M avg for finance). …

Category: Industry News / Business & Industry Impact / Business & Industry Impact

#bfsi#ai#phishing#deepfakes#india
🔴 HIGHThreat Intelligence

Health-ISAC Q3 Insights - Shai-Hulud npm worm, QR phishing surge, device exposures in Netscaler & Cisco ASA

Health-ISAC’s Q3 2025 Quarterly Threat Insights highlights intensifying threats to healthcare. Notable trends include the Shai-Hulud worm spreading via malicious npm packages that embed into developer…

Category: Threat Alerts / Threat Intelligence / Threat Intelligence

#healthcare#supply-chain#phishing#netscaler#cisco-asa#sbom

Explore More Tags

#2fa#7zip#aardvark#account-security#acl#acsc#ad#adobe#advisory#agentic-ai#agents#ai#ai-assisted-attacks#ai-enabled-threats#ai-native#ai-poisoning#ai-security#airlines#aisuru#akira#alert#amd#android#anomali#anubis#anydesk#apache#apache-tika#api-security#appsec#apt#apt36#arcgis#asm#ato#att#attck#aura_stealer#auth-bypass#automated-patching#automation#automotive#aviation#awareness#aws#azure#azurehound#banking#benchmarking#bfsi#big-ip#bind9#bitsight#blacksuit#blink#blob-storage#blockchain#bloodhound#board-governance#bopla#botnet#brash#breach#breakout-time#broadcom#broken-authorization#browser#brute-force#bulletproof-hosting#burp#c2#cache-poisoning#canada#cdr#cellebrite#cert#chaos#chatgpt#check-point#china#chrome#chromium#ci-cd#cisa#cisco-asa#cisco-talos#clickfix#clickjacking#clop#cloud#cloud-security#cloudflare-blocked#cmmc#cms#cnapp#cofense#coinimp#coldriver#collatz#collins-aerospace#compliance#confidential-computing#configurator#cookies#copilot#credential-harvesting#credential-leak#credential-stuffing#credential-theft#credentials#criminalip#critical-infrastructure#critical-update#crowdstrike#crypto#cryptography#cti#cve#cve-2025-40778#cve-2025-43995#cve-2025-48384#cve-2025-49844#cve-2025-54918#cve-2025-55320#cve-2025-55752#cve-2025-55754#cve-2025-59287#cve-2025-59295#cve-2025-61884#cve-2025-61932#cve-2025-6204#cve-2025-6205#cve-2025-62168#cve-2025-6325#cve-2025-6327#cve-2025-6950#cve-2025-8941#cve-2025-9242#cwpp#cybercrime#daily-brief#dark-web#dassault#data-breach#data-protection#data-sovereignty#data-theft#ddos#debian#deepfake#deepfakes#defender-for-storage#defense#defense-evasion#defi#dell#delmia#deserialization#deskrat#detection#developer-targeting#device-encryption#dfars#dfir#digital-defense-report#discord-webhooks#dlp#dns#documents#dod#dos#double-extortion#downtime#doxing#doxxing#dprk#dragos#dublin-airport#dynamodb#e-commerce#eaas#ebs#ece#ecommerce#edge#edr-evasion#elastic#elementor#email-security#emerging-tech#encryption#endpoint#energy#entra-id#enumeration#eol#eop#espionage#esxi#europe#europol#everest#executive-protection#exfiltration#explainable-ai#exploit#exposure#exprtai#extortion#f5#file-upload#fintech#fips#fireware#forensics#fortinet#framework#fraud#fuzzing#gaming#genai#geopolitics#ghost-network#ghostsecurity#git#gitlab#gmail#google#google-ads#google-tag#government#gps-spoofing#grapheneos#grpc#gstreamer#ha#hacktivism#hardware#hardware-security#hash#hash-functions#healthcare#hibp#higher-education#hitl#holdinghands_rat#homomorphic-encryption#honeypot#hooks#hunting#hypervisor#iacr#iam#icloud#ics#ics-attacks#ide#identity#identity-theft#ikev2#imo#impersonation#india#industrial#industrial-security#information-disclosure#infostealer#injunction#insider-threat#intel#ios#iot#iran#isc#japan#javascript#jewelbug#jinjava#jwt#kentico#kerberos#kernel#kev#kpir#l3harris#lanscope#lapsus$#latvia#layerx#lazarus#ldap#leak#leak-sites#legal#linux#linux-kernel#living-off-the-land#llm#llm-security#llmnr#loader#lockbit#logistics#lotl#lua#lwe#lynx#magento#malaysia#malvertising#malware#mandiant#manufacturing#maritime-security#mass-assignment#mass-attack#mayberobot#mcp#mdr#mena#mermaid#meta#mfa-bypass#mfa-fatigue#microsoft#microsoft-365#mining#mirai#mitre#mitre-attck#mobile#mobile-security#mod#money-laundering#motex#moxa#multisig#municipal#nation-state#nbtns#ncsc#ndss#net_capi_backdoor#netscaler#netsupport#new-york#news#newsletter#nexperia#nist#nist-800-171#nizk#norobot#npm#nso#nso_group#ntlm#nvd#oauth#obfuscation#obscura#odp#open-source#openai#openvsx#operation-dream-job#operational-technology#operations#oracle#osint#ot#ot-security#outage#paloalto#paloaltonetworks#pam#partnership#passkeys#password-manager#password-reuse#password-spray#patch#patch-tuesday#patching#payments#pdf#pentest#pentesting#persistence#phantomraven#phantomvai#phishing#phoenix-backdoor#php#pii#pixel#plugin#podcast#policy#post-quantum#powershell#pqc#preparedness#privacy#privilege-escalation#prompt-injection#prosper#protobuf#proxy#pwn2own#qilin#qr#qualys#quantum#raas#radare2#ransomware#rasman#rat#rce#rclone#rdd#rdp#reconnaissance#red-team#redis#research#resecurity#resilience#responder#retail#risk#risk-management#rootkit#routers#russia#rust#saas#safepay#salesforce#sandworm#sans#sas#sbom#scada#scam-protection#scattered_spider#security-affairs#security-key#security-tools#semiconductors#sentinellabs#seqrite_labs#sessionreaper#shadow-ai#shadow-it#side-channel#siem#sim_boxes#simcartel#slackware#slopsquatting#smart-contracts#smishing#snp#soc#social-engineering#softether#sonatype#sonicwall#sophos#spyware#squid#ssa-2025-291-01#ssrf#standards#stealer-logs#steganography#storage#stormcast#stunnel#supply-chain#survey#symlink#ta505#tata-motors#taxonomy#tcns#telecommunications#telegram#tenable#tencent_cloud#the-com#the_com#third-party#threat#threat-intel#threat-intelligence#threat-research#threat-trends#tiktok#tokenization#tomcat#tp-link#training#treaty#trojan#typosquatting#ubuntu#uk#ukraine#un#unit42#us#us-east-1#us_federal_officials#usn#usn-7833-2#v18#virtualization#virustotal#vishing#vmware#voice#vpn#vscode#vulnerability#vulnerability-management#vulnerability-scanning#vulnerability_management#watchguard#water-sector#web-skimming#web3#webshell#weekly#whatsapp#wifi#windows#winos_40#wireless-security#wordpress#workstation#wp-freeio#wso2#wsus#xortec#xxe#youtube#zdi#zero-day#zero-trust#zeroday#zip