GoIssue specializes in phishing and repository hijacking

GoIssue – The Tool Behind Recent GitHub Phishing Attacks

By Daniel Kelley Security Researcher We recently uncovered GoIssue, a tool marketed on a cybercrime forum that allows attackers to extract email addresses from GitHub profiles and send bulk emails directly to ...
Office Worker

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks

Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...
Office Worker

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks

Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...
New FishXProxy Phishing Kit

New FishXProxy Phishing Kit Lowers Barriers for Cybercriminals

Imagine receiving an email that looks perfectly legitimate, down to the last detail. This is the deceptive power of new FishXProxy Phishing Kit, a new phishing toolkit emerging from the cybercrime underground ...
New FishXProxy Phishing Kit

New FishXProxy Phishing Kit Lowers Barriers for Cybercriminals

Imagine receiving an email that looks perfectly legitimate, down to the last detail. This is the deceptive power of new FishXProxy Phishing Kit, a new phishing toolkit emerging from the cybercrime underground ...
Credential Phishing

Understanding Credential Phishing

Credential phishing is a type of cyberattack where attackers attempt to deceive your employees into providing their sensitive information, such as their Microsoft usernames and passwords. What is not obvious is credential ...
Today’s cybersecurity health checks must identify AI-based threat risks. Does yours?

Today’s cybersecurity health checks must identify AI based threats. Does yours?

Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace ...
The Truth About Why Malicious Links Get Through Security

The Truth About Why Malicious Links Get Through Security

KNOWN FACT: Malicious links are hosted on legitimate services like Google, Microsoft, AWS (Amazon Web Services), Wix, GoDaddy and many others, and these services are thought safe by many security services. The ...

State of Phishing Report Reveals More Than 255 Million Attacks in 2022

SlashNext analyzed billions of link-based URLs, attachments, and natural language messages in email, mobile and browser channels over six months in 2022 and found more than 255 million attacks – a 61% ...