Phishing Awareness


Robin Banks Phishing Service Back with Cookie Stealer and Russian Server

Robin Banks Phishing Service Back with Cookie Stealer and Russian Server

The Robin Banks PhaaS platform is back with a new Russian server and a cookie stealer to bypass 2FA and compromise organizational accounts. This article shares the history of Robin Banks, attack patterns, how Robin Banks evolved, the Robin Banks cookie stealer and Russian server, how Robin Banks’s phishing kit works, and how organizations can stay protected against Robin Banks’s phishing.

(more…)

Cybersecurity Updates For The Week 44 of 2022

Cybersecurity Updates For The Week 44 of 2022

Threat actors continue to target organizations worldwide to get access to their information assets. It may be challenging to anticipate a phishing attack, but one can surely learn from the attacks that have taken place to understand how these malicious actors operate and adopt anti-phishing measures accordingly. To that end, here are the phishing and breach-related updates for the week.

(more…)

As Twitter Plans To Charge Verified Users $8 Fee, Threat Actors Start Launching Phishing Campaigns Exploiting The Situation

As Twitter Plans To Charge Verified Users $8 Fee, Threat Actors Start Launching Phishing Campaigns Exploiting The Situation

Scammers and hackers are exploiting the confusion regarding Twitter’s new CEO, Elon Musk’s plans for paid blue ticks on the platform. They are sending phishing emails disguised as official Twitter notices and luring users into sharing their details. This post covers the details regarding such phishing schemes.

(more…)

Cybersecurity Updates For The Week 43 of 2022

Cybersecurity Updates For The Week 43 of 2022

Traditional cybersecurity measures cannot protect organizations against today’s phishing attacks as they are getting increasingly sophisticated. Thus, enterprises must take a layered approach to prevent cyber-attacks and lessen their impact when they occur. Additionally, they can learn from the latest trends in the cyber threat landscape. Here are this week’s phishing and data breach-related headlines.

(more…)

Social Engineering Attack on Twilio Compromises Employee Accounts and Customer Data

Social Engineering Attack on Twilio Compromises Employee Accounts and Customer Data

Twilio has suffered a second attack, leading to the compromise of its former and current employee accounts and the loss of sensitive customer information. This text shares the details of the attack, how it happened, whether it is over, whether customers are safe, how Twilio is dealing with it, and what organizations could learn from the cyberattack.

(more…)

United Kingdom Phishing Campaign Targets 700,000 British Residents, Employs Emails, Texts, and Whatsapp

United Kingdom Phishing Campaign Targets 700,000 British Residents, Employs Emails, Texts, and Whatsapp

Individuals in the United Kingdom are targeted by sophisticated phishing campaigns to target finances and personal details, taking advantage of the rising cost of living and post-COVID changes. This article delves deep into the latest UK phishing campaign, shares key statistics, how fraudsters target brits, and how to do phishing protection.

(more…)

CEO Fraud: How Scammers Are Impersonating Executives And How To Protect Yourself

CEO Fraud: How Scammers Are Impersonating Executives And How To Protect Yourself

One of the latest scams to steal your money, your identity and your confidence is CEO fraud.

CEO fraud, also known as business email compromise (BEC), is one of the most common forms of business email fraud.

It’s a scam where criminals impersonate an executive at your company and request that you wire money or transfer funds to an account under their control. CEO Fraud is a huge problem and it only takes seconds for someone to intercept an email and make it look legitimate.

(more…)

Learn How To Protect Yourself From Sophisticated Phishing Email Scams

Learn How To Protect Yourself From Sophisticated Phishing Email Scams

In today’s digital age, phishing emails are one of the most common ways malware and viruses are spread. While most people are familiar with phishing scams, phishing emails are a little different than other types of scams.

Not only do phishing emails interact with users through spam mail or phishing emails sent to their inbox, but they also often carry malicious attachments or links that direct users to sites infected with malware or viruses. Phishing emails are spread through spam emails and spam messages. So ensure appropriate phishing protection solutions when you are online.

(more…)