Researchers say the campaign uses a browser-based JavaScript VM to hide credential theft and intercept MFA at scale.
The Tycoon2FA phishing kit now supports device-code phishing attacks and abuses Trustifi click-tracking URLs to hijack ...
Tycoon2FA has returned with new device-code phishing attacks targeting Microsoft 365 users through legitimate OAuth login flows.
A legacy Windows scripting utility tied to Internet Explorer is still being used in modern malware campaigns, researchers say ...
Copycat hackers are competing to win $1,000 for the largest supply chain attack using Shai-Hulud, an open-sourced worm that has brought down a few major open-source projects. Malicious NPM packages ...
A critical security vulnerability impacting the Funnel Builder plugin for WordPress has come under active exploitation in the wild to inject malicious JavaScript code into WooCommerce checkout pages ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results