by Matt Mosley | Jun 16, 2022 | blog, phish
Update: The Phish Goes On - 5 Million Stolen Credentials and Counting June 16, 2022 When PIXM’s threat research team first broke the news of a large-scale phishing campaign that had successfully stolen millions of credentials from legitimate Facebook users, we...
by Nick Ascoli | Jun 6, 2022 | blog, Hacking
Intro It is rare that the identities of participants and ringleaders in criminal phishing schemes are uncovered. But in many cases, when untangling the web of a cyber criminal group (particularly with financially motivated e-crime actors), there are enough OSINT...
by Chris Cleveland | Feb 16, 2019 | blog
TL;DR Stealth Phishing Attacks – highly sophisticated attacks where attackers block any cloud-based service from seeing their phishing page, and show it only to targeted victims on their devices in real-time when they click on the phishing link Stealth phishing...
by Chris Cleveland | Feb 15, 2019 | blog, Hacking, Social Engineering
TL;DR Someone tried accessing my work account (enabled with Authenticator) Within an hour, I received a Microsoft Outlook phishing attack in my work email Upon clicking on the link, Pixm shut down the attack within one second in my browser All major cybersecurity...
Recent Comments