email-security

Preview image for: Deconstructing the Deception: A Technical Analysis of a Fake Incident Report Phishing Campaign (Feb 17th)

Deconstructing the Deception: A Technical Analysis of a Fake Incident Report Phishing Campaign (Feb 17th)

Deep dive into a recent phishing campaign leveraging fake incident reports to exploit trust and harvest credentials. Explore TTPs, forensic analysis, and mitigation.
Preview image for: Anomalous Phishing URLs: Unmasking Evasion Tactics in Recent Campaigns (Thu, Feb 5th)

Anomalous Phishing URLs: Unmasking Evasion Tactics in Recent Campaigns (Thu, Feb 5th)

Analyzing the surge of 'broken' phishing URLs observed on Feb 5th, revealing sophisticated evasion and obfuscation techniques by threat actors.
Preview image for: Weaponizing Trust: Google Presentations Exploited in Vivaldi Webmail Phishing Campaign

Weaponizing Trust: Google Presentations Exploited in Vivaldi Webmail Phishing Campaign

Attackers leverage Google Presentations for phishing Vivaldi Webmail users, bypassing security and harvesting credentials via trusted domains.
Preview image for: Zendesk Under Siege: Global Spam Wave Exploits Unsecured Support Systems

Zendesk Under Siege: Global Spam Wave Exploits Unsecured Support Systems

Unsecured Zendesk systems are hijacked globally, unleashing a massive spam wave, overwhelming users with malicious and alarming emails.
X
To give you the best possible experience, https://iplogger.org uses cookies. Using means you agree to our use of cookies. We have published a new cookies policy, which you should read to find out more about the cookies we use. View Cookies politics