credential stealing

GoIssue – The Tool Behind Recent GitHub Phishing Attacks
By Daniel Kelley Security Researcher We recently uncovered GoIssue, a tool marketed on a cybercrime forum that allows attackers to extract email addresses from GitHub profiles and send bulk emails directly to ...

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...

New FishXProxy Phishing Kit Lowers Barriers for Cybercriminals
Imagine receiving an email that looks perfectly legitimate, down to the last detail. This is the deceptive power of new FishXProxy Phishing Kit, a new phishing toolkit emerging from the cybercrime underground ...

New FishXProxy Phishing Kit Lowers Barriers for Cybercriminals
Imagine receiving an email that looks perfectly legitimate, down to the last detail. This is the deceptive power of new FishXProxy Phishing Kit, a new phishing toolkit emerging from the cybercrime underground ...

Understanding Credential Phishing
Credential phishing is a type of cyberattack where attackers attempt to deceive your employees into providing their sensitive information, such as their Microsoft usernames and passwords. What is not obvious is credential ...

Massive ‘New’ Leaked Credentials List: Naz.API Pwns Troy
Have I been pwned? Yes, you probably have. Stop reusing passwords, already. Here’s what else you should do ...

Today’s cybersecurity health checks must identify AI based threats. Does yours?
Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace ...

The Truth About Why Malicious Links Get Through Security
KNOWN FACT: Malicious links are hosted on legitimate services like Google, Microsoft, AWS (Amazon Web Services), Wix, GoDaddy and many others, and these services are thought safe by many security services. The ...
State of Phishing Report Reveals More Than 255 Million Attacks in 2022
SlashNext analyzed billions of link-based URLs, attachments, and natural language messages in email, mobile and browser channels over six months in 2022 and found more than 255 million attacks – a 61% ...