FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

Watch Out for Spoofed Zoom, Skype, Google Meet Sites Delivering Malware

By: Newsroom β€” March 7th 2024 at 06:11
Threat actors have been leveraging fake websites advertising popular video conferencing software such as Google Meet, Skype, and Zoom to deliver a variety of malware targeting both Android and Windows users since December 2023. β€œThe threat actor is distributing Remote Access Trojans (RATs) including SpyNote RAT for Android platforms, and NjRAT and DCRat for Windows
☐ β˜† βœ‡ The Hacker News

Cybercriminals Using EvilProxy Phishing Kit to Target Senior Executives in U.S. Firms

By: Newsroom β€” October 9th 2023 at 12:36
Senior executives working in U.S.-based organizations are being targeted by a new phishing campaign that leverages a popular adversary-in-the-middle (AiTM) phishing toolkit namedΒ EvilProxyΒ to conduct credential harvesting and account takeover attacks. Menlo Security said the activity started in July 2023, primarily singling out banking and financial services, insurance, property management and
☐ β˜† βœ‡ The Hacker News

Cybercriminals Increasingly Using EvilProxy Phishing Kit to Target Executives

By: THN β€” August 10th 2023 at 09:45
Threat actors are increasingly using a phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy to pull off account takeover attacks aimed at high-ranking executives at prominent companies. According to Proofpoint, an ongoing hybrid campaign has leveraged the service to target thousands of Microsoft 365 user accounts, sending approximately 120,000 phishing emails to hundreds of organizations
☐ β˜† βœ‡ The Hacker News

New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor Security

By: Ravie Lakshmanan β€” September 6th 2022 at 06:47
A new phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy is being advertised on the criminal underground as a means for threat actors to bypass two-factor authentication (2FA) protections employed against online services. "EvilProxy actors are using reverse proxy and cookie injection methods to bypass 2FA authentication – proxifying victim's session," Resecurity researchersΒ saidΒ in a Monday
❌