2025-03-04 (Tuesday) : Group Claiming To Be BianLian Sends Paper-Based Extortion Letters via Postal...

0
On March 4, 2025, a group claiming to be the notorious threat actor BianLian began sending paper-based extortion letters to executives at U.S.-based organizations....

Browser Autofill Phishing – The Hidden Dangers And Security Risks

0
In today’s digital age, convenience often comes at the cost of security. One such overlooked convenience is the browser autofill feature—a handy tool that...

A Nice Day Phishing : Exploring Portable Python For Covert Execution

0
Scripting Interpreters are agreat method to achieve Command or Shellcode Execution, but one of many problems is that they: Are not Native to Windows Not always...

reCAPTCHA Phish – A Dive Into Social Engineering Tactics

0
This is small harness to recreate the social engineering and phishing lure recently seen in the wild around August/September 2024. The Lure In The Wild Originally...

Phishing Engagement Infrastructure Setup Guide

0
The essential steps and strategies for setting up a robust phishing engagement infrastructure. From acquiring and categorizing domains to automating your phishing efforts, this...

Thief Raccoon – A Comprehensive Guide To Simulating Phishing Attacks For Cybersecurity Education

0
Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating systems. This tool is...

JEOrg Security Defense Test Drives – Elevating Email Protection And Fraud Detection

0
In the digital age, safeguarding our digital communication is paramount. "JEOrg Security Defense Test Drives" embarks on a mission to fortify email security and...

BITB – Browser Templates For The Browser In The Browser Attack

0
The idea of a BITB (Browser Templates For The Browser In The Browser) attack came about because of new computer threats. This advanced method...

What are the Types of Malware Infecting Your Computer

0
Malware is a malicious computer program that is designed to infect your system and gain access to sensitive information without the user's permission. Software is referred to...

These Three Tips Can Help you to Protect from Phishing Attacks

0
The most dangerous part of a phishing attack is the belief that it can’t happen to you. Getting scammed on the Internet always feels...