Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us

phishing attack

  • Home
  • phishing attack
From Dark Reading – Gootloader Malware Resurfaces in Google Ads for Legal Docs
Posted inNews

From Dark Reading – Gootloader Malware Resurfaces in Google Ads for Legal Docs

Attackers target a familiar industry, law professionals, by hiding the infostealer in ads delivered via Google-based malvertising. Read More  
Posted by shaikh Saqib April 2, 2025
From Cyber Security News – Hackers Employ New ClickFix Captcha Technique to Deliver Ransomware
Posted inNews

From Cyber Security News – Hackers Employ New ClickFix Captcha Technique to Deliver Ransomware

 A sophisticated social engineering technique known as ClickFix has emerged, leveraging fake CAPTCHA verification processes to deceive users into executing malicious commands. This method exploits the trust users have in…
Posted by shaikh Saqib March 30, 2025
From Dark Reading – Iran’s MOIS-Linked APT34 Spies on Allies Iraq & Yemen
Posted inNews

From Dark Reading – Iran’s MOIS-Linked APT34 Spies on Allies Iraq & Yemen

The Islamic Republic is keeping its enemies close and its friends closer, with espionage attacks aimed at nearby neighbors. Read More  
Posted by shaikh Saqib March 28, 2025
From Cybersecurity Help – Google patches Chrome zero-day bug exploited by hackers
Posted inVulnerabilities

From Cybersecurity Help – Google patches Chrome zero-day bug exploited by hackers

CVE-2025-2783 works in conjunction with a remote code execution exploit, which has yet to be identified.  ​ Read More  ​ 
Posted by Samir K March 26, 2025
From Dark Reading – Google Hastily Patches Chrome Zero-Day Exploited by APT
Posted inNews

From Dark Reading – Google Hastily Patches Chrome Zero-Day Exploited by APT

Researchers at Kaspersky discovered cyber-espionage activity that used the vulnerability in a one-click phishing attack to deliver malware. Read More  
Posted by shaikh Saqib March 26, 2025
From Cyber Security News – New Sophisticated Phishing Attack Exploiting Microsoft 365 Infrastructure To Attack Users
Posted inNews

From Cyber Security News – New Sophisticated Phishing Attack Exploiting Microsoft 365 Infrastructure To Attack Users

 A sophisticated new phishing campaign has been discovered that exploits Microsoft 365’s legitimate infrastructure to conduct highly convincing credential harvesting and account takeover attempts. Unlike traditional phishing attempts that rely…
Posted by shaikh Saqib March 18, 2025
From Krebs on Security – ClickFix: How to Infect Your PC in Three Easy Steps
Posted inArticles

From Krebs on Security – ClickFix: How to Infect Your PC in Three Easy Steps

A clever malware deployment scheme first spotted in targeted attacks last year has now gone mainstream. In this scam, dubbed "ClickFix," the visitor to a hacked or malicious website is…
Posted by Samir K March 15, 2025
From Cyber Security News – LibreOffice Vulnerability Let Attackers Execute Arbitrary Script Using Macro URL
Posted inNews

From Cyber Security News – LibreOffice Vulnerability Let Attackers Execute Arbitrary Script Using Macro URL

 A critical security vulnerability in LibreOffice tracked as CVE-2025-1080, has exposed millions of users to potential remote code execution attacks through manipulated macro URLs.  Patched in versions 24.8.5 and 25.2.1…
Posted by shaikh Saqib March 6, 2025
From Cyber Security News – 41,500+ VMware ESXi Instances Vulnerable to Code Execution Attacks
Posted inNews

From Cyber Security News – 41,500+ VMware ESXi Instances Vulnerable to Code Execution Attacks

 Shadowserver observed that 41,500+ internet-exposed VMware ESXi hypervisors as of March 4, 2025, are vulnerable to CVE-2025-22224, a critical zero-day vulnerability actively exploited in attacks. Broadcom patched the vulnerability in…
Posted by shaikh Saqib March 6, 2025
From Cyber Security News – Hackers Deliver XWorm via Malicious Registry Files in a New Stegocampaign Attack
Posted inNews

From Cyber Security News – Hackers Deliver XWorm via Malicious Registry Files in a New Stegocampaign Attack

 Stegoсampaign, a complex attack that leverages phishing, a multi-functional RAT, а loader, and malicious scripts, got a new twist. ANY.RUN’s malware analysts discovered a Stegocampaign variant that uses a Windows…
Posted by shaikh Saqib March 4, 2025
From Cyber Security News – Hackers Bypassing Outlook Spam Filter to Deliver Weaponized ISO Files
Posted inNews

From Cyber Security News – Hackers Bypassing Outlook Spam Filter to Deliver Weaponized ISO Files

 A newly uncovered technique allows threat actors to bypass Microsoft Outlook’s spam filtering mechanisms, enabling the delivery of malicious ISO files through seemingly benign email links.  This vulnerability exposes organizations…
Posted by shaikh Saqib February 25, 2025
From Security Week – $1.5 Billion Bybit Heist Linked to North Korean Hackers
Posted inNews

From Security Week – $1.5 Billion Bybit Heist Linked to North Korean Hackers

[[{"value":"Companies and experts have found evidence linking the $1.5 billion Bybit cryptocurrency heist to North Korean Lazarus hackers. The post $1.5 Billion Bybit Heist Linked to North Korean Hackers appeared…
Posted by shaikh Saqib February 24, 2025
From Dark Reading – ‘Darcula’ Phishing Kit Can Now Impersonate Any Brand
Posted inNews

From Dark Reading – ‘Darcula’ Phishing Kit Can Now Impersonate Any Brand

With Version 3, would-be phishers can cut and paste a big brand's URL into a template and let automation do the rest. Read More  
Posted by shaikh Saqib February 20, 2025
From Cyber Security News – Weaponized Signal, Line, and Gmail Apps Delivers Malware That Changes System Defenses
Posted inNews

From Cyber Security News – Weaponized Signal, Line, and Gmail Apps Delivers Malware That Changes System Defenses

 A sophisticated cyberattack campaign targeting Chinese-speaking users, malicious actors have weaponized fake versions of popular applications such as Signal, Line, and Gmail. These fake and weaponized apps are distributed via…
Posted by shaikh Saqib February 19, 2025
From Security Week – Alabama Man Pleads Guilty to Hacking SEC’s X Account
Posted inNews

From Security Week – Alabama Man Pleads Guilty to Hacking SEC’s X Account

[[{"value":"Eric Council Jr. pleaded guilty to hacking the X (formerly Twitter) account of the US Securities and Exchange Commission. The post Alabama Man Pleads Guilty to Hacking SEC’s X Account…
Posted by shaikh Saqib February 11, 2025

Latest Posts

  • From The Hacker News – Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops MalwareJanuary 28, 2026
  • From Cyber Security News – Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing LinksJanuary 28, 2026
  • From Dark Reading – China-Backed ‘PeckBirdy’ Takes Flight for Cross-Platform AttacksJanuary 28, 2026
  • From Cyber Security News – TP-Link Archer Vulnerability Let Attackers Take Control Over the RouterJanuary 28, 2026
  • From Cyber Security News – Gemini MCP Tool 0-day Vulnerability Allows Remote Attackers to Execute Arbitrary CodeJanuary 28, 2026
Total Visitors
1011529

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • May 2022
Copyright 2026 — Threat Note. All rights reserved. Bloghash WordPress Theme
Scroll to Top