2025-03-04 (Tuesday) : Group Claiming To Be BianLian Sends Paper-Based Extortion Letters via Postal...
On March 4, 2025, a group claiming to be the notorious threat actor BianLian began sending paper-based extortion letters to executives at U.S.-based organizations....
Browser Autofill Phishing – The Hidden Dangers And Security Risks
In today’s digital age, convenience often comes at the cost of security. One such overlooked convenience is the browser autofill feature—a handy tool that...
A Nice Day Phishing : Exploring Portable Python For Covert Execution
Scripting Interpreters are agreat method to achieve Command or Shellcode Execution, but one of many problems is that they:
Are not Native to Windows
Not always...
reCAPTCHA Phish – A Dive Into Social Engineering Tactics
This is small harness to recreate the social engineering and phishing lure recently seen in the wild around August/September 2024.
The Lure In The Wild
Originally...
Phishing Engagement Infrastructure Setup Guide
The essential steps and strategies for setting up a robust phishing engagement infrastructure.
From acquiring and categorizing domains to automating your phishing efforts, this...
Thief Raccoon – A Comprehensive Guide To Simulating Phishing Attacks For Cybersecurity Education
Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating systems.
This tool is...
JEOrg Security Defense Test Drives – Elevating Email Protection And Fraud Detection
In the digital age, safeguarding our digital communication is paramount.
"JEOrg Security Defense Test Drives" embarks on a mission to fortify email security and...
BITB – Browser Templates For The Browser In The Browser Attack
The idea of a BITB (Browser Templates For The Browser In The Browser) attack came about because of new computer threats. This advanced method...
What are the Types of Malware Infecting Your Computer
Malware
is a malicious computer program that is designed to infect your system and gain
access to sensitive information without the user's permission. Software is
referred to...
These Three Tips Can Help you to Protect from Phishing Attacks
The most dangerous part of a phishing attack is the belief that it can’t happen to you. Getting scammed on the Internet always feels...