Search Articles

Search Results: Phishing

Cyble Uncovers Sophisticated Phishing Campaign Targeting Global Enterprises

Cyble Uncovers Sophisticated Phishing Campaign Targeting Global Enterprises

Cyble's latest threat intelligence report reveals an evolving phishing operation exploiting business communication platforms to steal credentials and sensitive data. The campaign employs advanced social engineering tactics, posing a significant risk to organizations worldwide. Security teams must prioritize employee training and multi-factor authentication to mitigate these threats.
When LLMs Turn Pull Requests Into Phishing: The Rise of AI-Generated PR Slop

When LLMs Turn Pull Requests Into Phishing: The Rise of AI-Generated PR Slop

As large‑language‑model tools become ubiquitous, developers are flooding open‑source projects with low‑effort, AI‑generated pull requests that mimic legitimate fixes. This new wave of "slop" not only wastes maintainers’ time but also mirrors classic supply‑chain attack tactics, raising urgent questions about trust and safety on GitHub.
Princeton University Data Breach Exposes Alumni and Donor Information in Phishing Attack

Princeton University Data Breach Exposes Alumni and Donor Information in Phishing Attack

Princeton University has disclosed a cyberattack that compromised a database containing personal details of alumni, donors, students, and faculty, initiated through a targeted phishing attack on an employee. While no financial data or credentials were affected, the incident highlights ongoing vulnerabilities in higher education institutions. This breach follows a similar incident at UPenn, raising concerns about targeted attacks on university networks.
Google’s RICO Gamble: Turning Phishing-as-a-Service into Organized Crime

Google’s RICO Gamble: Turning Phishing-as-a-Service into Organized Crime

Google is invoking U.S. racketeering law against an alleged China-based smishing network it says compromised data tied to up to 100 million credit cards. Beyond the headline, this is an aggressive test of how far platforms can go to weaponize civil litigation against phishing-as-a-service operations—and a signal that the security playbook is shifting.