Microsoft and Google almost always land on the list of most-phished brands, and that is not surprising given their huge market presence. And phishers are often the most likely threat actors to bank on the brands' popularity for the success of their attacks. more
Sneaky 2FA, believed to be sold via the phishing-as-a-service (PhaaS) business model, recently figured in an adversary-in-the-middle (AitM) attack targeting Microsoft 365 users. Marketed as Sneaky Log by a full-featured bot on Telegram, Sneaky 2FA reportedly used fake Microsoft authentication pages with automatically filled-in email address fields to add to its sense of authenticity. more
The extension includes custom features in terms of location and size on your browser and links directly to the IPv4.Global marketplace if something scrolls by that interests you. more
IPv4.Global, the world's largest, most trusted and transparent IPv4 marketplace, today announced a first-of-its kind loan facility backed by the borrower's IPv4 addresses as collateral. more
The market for IPv4 addresses continues to exhibit stability, albeit at significantly lower prices than in previous peak periods. Data from IPv4.Global by Hilco Streambank suggests that while there is a notable spread in pricing - often reaching a 30% difference between high and low valuations - the overall trend points to a subdued yet steady marketplace. more
Radix's latest Premium Domains Report for the second half of 2024 highlights a strong performance across its portfolio, with .fun domains experiencing exceptional growth. Premium domain registrations increased by 11% year-on-year, while premium renewals rose by 16%. more
Several American and European organizations across the energy, oil and gas, and legal sectors were recently targeted by a campaign leveraging MintsLoader, a malware loader that delivers malicious software to a victim's device. more
It's not unusual for threat actors to pick up after fellow cyber attackers shut down their operations. Many of them still want to cause as much trouble without having to start from scratch - building their own malicious creations and infrastructure. more
watchTowr Labs investigated thousands of abandoned but live backdoors installed on various compromised sites to determine what data the original backdoor owners have stolen. They published their findings in "Backdooring Your Backdoors -- Another $20 Domain, More Governments" and, in the process, identified 34 domains as indicators of compromise (IoCs). more
The market for IPv4 addresses continues to show resilience, with January 2025 figures indicating a modest uptick in pricing across several block sizes. Data from IPv4.Global by Hilco Streambank reveals that while average prices hovered in the low-to-mid $30s per address, the actual range of transactions was significantly broader, spanning from $28 to $48 per address. This highlights the persistent pricing variability driven by block size, buyer urgency, and negotiation dynamics. more
Unit 42 of Palo Alto Networks recently uncovered a phishing campaign targeting European companies to harvest victims' account credentials and take over their Microsoft Azure cloud infrastructure. According to their report, the phishing attempts leveraging the HubSpot Free Form Builder service peaked in June 2024. more
Using resumes to fake job applications is not a novel social engineering lure for run-of-the-mill phishing campaigns. But utilizing the same tactic to launch a targeted attack isn't that common. more
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global