AI platforms fake CAPTCHA phishing campaigns are rising sharply. Attackers abuse services like Vercel, Netlify, and Lovable to host convincing CAPTCHA pages. These fake security checks redirect users to credential theft sites, making phishing harder to detect. How the Scam Works Cybercriminals exploit low-code AI platforms to deploy phishing campaigns quickly. They publish sites with…
Microsoft seizes phishing sites connected to Raccoon0365, a Nigerian group running a subscription-based cybercrime service. Nearly 340 domains were taken down. These websites hosted fake Microsoft login pages designed to steal credentials. The takedown is one of the largest anti-phishing operations Microsoft has led this year. How Raccoon0365 Operated The group launched its service in…
VoidProxy phishing service is targeting Microsoft 365 and Google accounts with advanced techniques. Security researchers warn that the service enables large-scale credential theft and account takeovers. The attacks highlight growing threats from adversary-in-the-middle tactics. How the Attacks Work Attackers launch phishing campaigns using compromised marketing platforms and third-party email tools. Victims receive links that redirect…
Authorities have confirmed a Moldovan espionage scandal after the arrest of a former intelligence official accused of leaking secrets to Belarus. The suspect, previously a senior figure in Moldova’s Information and Security Service, allegedly passed sensitive state documents to Belarusian operatives during secret meetings. The arrest took place in Romania on September 8, 2025. It…
The FCC phishing scam warning highlights a new threat targeting popular streaming customers. Cybercriminals are sending fake emails that impersonate Amazon Prime Video, Comcast, and Spectrum. These scams attempt to steal sensitive information, including credit card details and login credentials. Phishing attacks remain one of the most common online threats. The FCC’s alert warns that…
The iCloud Calendar phishing campaign shows how attackers abuse Apple’s trusted infrastructure. Criminals managed to send phishing emails through Apple servers, using iCloud Calendar invites as their delivery method. This unusual technique increases the credibility of the scams. How the Attack Works Phishing campaigns usually rely on compromised email servers or spoofed addresses. In this…
Scammers fake job offers to trick job seekers into revealing sensitive personal information. These schemes impersonate big names like Nvidia, Glassdoor, RedBull, and Marriott. Researchers at Fortra recently uncovered a sophisticated phishing campaign targeting hopeful candidates with fake job opportunities. How the Scam Works The scammers send emails posing as recruiters from well-known companies. They…
The British taxpayer phishing scam has led to a significant breakthrough after Romanian police arrested 13 suspects linked to a £47 million fraud scheme. The scam targeted over 100,000 UK taxpayers, illegally accessing HMRC accounts to claim fraudulent government payments. This joint investigation highlights the ongoing threat posed by organized cybercrime groups against national tax…
Millions still rely on Multi-Factor Authentication (MFA) using text messages or authenticator apps. But these defenses are no longer enough. MFA phishing attacks are rising fast, showing how attackers can easily bypass weak security layers.What once felt safe is now one of the weakest links in online protection. How MFA Became a Target First, security…
Large language models (LLMs) are becoming trusted digital assistants. But LLM phishing links are now creating serious cybersecurity risks. AI chatbots are confidently recommending fake login pages that lead to scams and data theft. This emerging problem is not just a harmless error—it’s an opportunity for cybercriminals. Netcraft researchers recently discovered that AI tools served…