CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Phishing Campaign
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Phishing Campaign

Businessman typing on keyboard laptop computer and holding smartphone showing Okta phishing campaign
Cyber SecurityNews

Twilio Hackers Behind Okta Phishing Campaign That Breached Over 130 Organizations

August 31, 2022
In the roughly five months that the Okta phishing campaign has been active, it has racked up 9,931 login credentials from about 130 organizations. 5,541 included MFA codes, and 3,120 included the victim's email account.
Read More
Woman with a mobile phone and a laptop computer showing MFA bypass via phishing campaign
Cyber SecurityNews

Hackers Target 10,000 Organizations With a New MFA Bypass in Coordinated Phishing Campaign on Office 365 Users

July 22, 2022
Microsoft discovered a coordinated phishing campaign targeting Office 365 users and leveraging an Adversary-in-the-Middle (AiTM) MFA bypass to execute business email compromise (BEC) attacks and commit fraud.
Read More
Notifications about many unread messages on Facebook Messenger on a smartphone showing phishing campaign on Facebook credentials
Cyber SecurityNews

One Million Facebook Credentials Compromised in Four Months by Ongoing Phishing Campaign

June 21, 2022
Security researchers have documented a Facebook credential phishing campaign that has been active since late 2021, and has been highly successful in duping victims using an authentic-looking spoofed login page.
Read More
NHS logo with heart silhouette showing email accounts used for phishing campaign
Cyber SecurityNews

Legitimate NHS Email Accounts Exploited in Credential Harvesting Phishing Campaign and Advance-Fee Scams

May 13, 2022
Threat actors leveraged 139 compromised NHS email accounts to send thousands of malicious emails in a credential harvesting phishing campaign and advance-fee scam.
Read More
Malware symbol showing Russian hackers phishing campaign
Cyber SecurityNews

Phishing Campaign by Russian Hackers Uses Trello, Dropbox to Target Diplomats

May 13, 2022
The embassy phishing campaign is just one element of a rash of recent activity by the Russian hackers referred to as APT 29, probably better known to the general public as Cozy Bear.
Read More
Fish hook with keys on computer circuit board showing phishing campaign by SolarWinds hackers
Cyber SecurityNews

SolarWinds Hackers Return, Launch Phishing Campaign Using Compromised Account of US Foreign Aid Agency

May 31, 2021
The SolarWinds hackers are back again, this time leveraging the stolen email account of a United States federal agency to run a phishing campaign against 150 government entities in 24 countries.
Read More
Woman holding mobile phone with username and password login screen showing phishing campaign
Cyber SecurityNews

Attackers Load Targeted Company’s Homepage in Email Phishing Campaign

September 11, 2020
Researchers found that hackers were harvesting enterprise login details by overlaying legitimate companies' webpages with fake login prompts in an email phishing campaign.
Read More
Businessman using tablet in car showing the Perswaysion phishing campaign that is targeting C-suite executives at international organizations
Cyber SecurityNews

Widespread “Perswaysion” Phishing Campaign Is Targeting the C-Suite of Hundreds of International Organizations

May 12, 2020
A new phishing campaign that chains exploits from Microsoft’s Sway, OneNote and Sharepoint services is targeting C-suite executives at a wide range of organizations worldwide.
Read More
Security locks with hook on keyboard showing hackers targeting UN with phishing campaign
Cyber SecurityNews

Hackers Target UN and Humanitarian Organizations With Phishing Campaign

November 1, 2019
Since March 2019, hackers have been targeting the UN and affiliated humanitarian aid organizations with a sophisticated, mobile-centric phishing campaign to harvest Microsoft Office 365 login credentials.
Read More

Latest

Cloud computing technology with lock showing API security for cloud apps

Why API Security Should Be Your First Step in Protecting Your Cloud Apps

Arrested hacker in handcuffs showing hacking forum operator charged with cybercrime

Hacking Forum “BreachForums” Alleged Owner Pompompurin Arrested and Charged With Cybercrime

Shopper using laptop showing ecommerce fraud for online brands

Online Brands: Keep Your Friends Close, and Fraud Even Closer

Pinduoduo logo on tablet showing Chinese shopping app with malware

Chinese Shopping App Pinduoduo Blocked by Google Over Signs of Malware in Its Code

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results