Tagged articles
31 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 20, 2026 · Information Security

How Apple’s Trusted Email System Was Exploited for Phishing Attacks

A sophisticated phishing campaign abused Apple’s account‑change notification template, injecting malicious content into a legitimately signed email, which bypassed SPF, DKIM and DMARC checks and achieved near‑100% delivery, while also evolving into a “telephone‑oriented” social‑engineering variant.

AppleDKIMDMARC
0 likes · 7 min read
How Apple’s Trusted Email System Was Exploited for Phishing Attacks
Black & White Path
Black & White Path
Apr 12, 2026 · Information Security

How an APT Hijacked Apple Accounts in 30 Seconds to Spy on Middle‑East Journalists

A three‑year investigation by Access Now, SMEX and Lookout reveals that the Indian APT group BITTER conducted rapid Apple‑ID phishing, 2FA‑relay attacks and Android spyware deployments to fully compromise the accounts of journalists across the Middle East and North Africa, often within 30 seconds of credential entry.

2FA bypassAPTAndroid spyware
0 likes · 9 min read
How an APT Hijacked Apple Accounts in 30 Seconds to Spy on Middle‑East Journalists
Black & White Path
Black & White Path
Mar 29, 2026 · Information Security

The Chaotic Reality of Weaponized AI: WormGPT and the Phishing Arms Race

The article examines how easily accessible, unfiltered large language models enable even novice attackers to create sophisticated, personalized phishing campaigns and rapid reconnaissance, while defenders scramble to adopt small, locally‑run AI models for detection, UEBA, and reverse‑engineering of AI‑generated malware.

AI defenseAI weaponizationRed Teaming
0 likes · 13 min read
The Chaotic Reality of Weaponized AI: WormGPT and the Phishing Arms Race
Black & White Path
Black & White Path
Mar 23, 2026 · Information Security

FBI Warns: Russian Hackers Launch Massive Phishing Attack on WhatsApp and Signal Users

The FBI and CISA have issued an urgent alert that Russian-linked threat actors are conducting large‑scale phishing campaigns against WhatsApp and Signal users, using social‑engineering tricks such as fake support messages, code‑request scams, and malicious links to hijack accounts and monitor communications.

FBIWhatsAppinformation security
0 likes · 6 min read
FBI Warns: Russian Hackers Launch Massive Phishing Attack on WhatsApp and Signal Users
Black & White Path
Black & White Path
Mar 13, 2026 · Information Security

Beware: Generative AI as a New Cybercrime Ally—13 Enterprise Attack Vectors

The article analyzes how generative AI is transforming cybercrime by enabling 13 distinct attack methods—from highly personalized phishing emails and AI‑assisted malware creation to automated vulnerability hunting, deep‑fake social engineering, malicious LLMs, and attacks on AI infrastructure—highlighting recent research data and real‑world examples that illustrate the heightened speed, stealth, and accessibility of modern threats.

AI InfrastructureLLM Securitycybercrime
0 likes · 13 min read
Beware: Generative AI as a New Cybercrime Ally—13 Enterprise Attack Vectors
Black & White Path
Black & White Path
Mar 6, 2026 · Industry Insights

Beware Invoice Phishing and Israel’s Cyber Attack on Iran: A Deep Dive into Modern Threats

The article warns of sophisticated invoice‑phishing emails that can implant malware and outlines three practical defenses, then shifts to a detailed analysis of Israel’s cyber strike on Iran’s missile command, explaining the attack’s technical layers, hybrid war model, strategic implications, and future risks.

Cyber Warfarehybrid warfareindustrial control systems
0 likes · 11 min read
Beware Invoice Phishing and Israel’s Cyber Attack on Iran: A Deep Dive into Modern Threats
Black & White Path
Black & White Path
Feb 26, 2026 · Information Security

13 Ways Attackers Leverage Generative AI to Exploit Systems

The article outlines thirteen distinct techniques by which cybercriminals exploit generative AI—from hyper‑personalized phishing and AI‑driven malware creation to AI‑coordinated espionage, deep‑fake social engineering, and attacks on AI infrastructure—backed by expert quotes, research findings, and concrete case studies.

AI InfrastructureAI agentsattack vectors
0 likes · 14 min read
13 Ways Attackers Leverage Generative AI to Exploit Systems
Black & White Path
Black & White Path
Feb 20, 2026 · Information Security

5 Hidden Risks of Sharing Workplace Updates on Social Media

The article analyzes how everyday posts on platforms like WeChat, GitHub, and TikTok can be harvested as open‑source intelligence, enabling phishing, BEC, and deep‑fake attacks, and offers concrete mitigation steps for security professionals.

BECOSINTcybersecurity awareness
0 likes · 9 min read
5 Hidden Risks of Sharing Workplace Updates on Social Media
Swan Home Tech Team
Swan Home Tech Team
Jul 21, 2025 · Information Security

Phishing & Ransomware Defense: Tactics, Tools, and Systemic Strategies

This article dissects modern phishing and ransomware threats, detailing preparation, bait construction, email header spoofing, and open‑source tools like Gophish, then outlines comprehensive defensive measures—from endpoint security and threat intelligence to risk‑based response economics—offering a systematic, technology‑to‑tactics‑to‑strategy framework for information security teams.

Gophishinformation securityphishing
0 likes · 15 min read
Phishing & Ransomware Defense: Tactics, Tools, and Systemic Strategies
ShiZhen AI
ShiZhen AI
Jan 7, 2025 · Artificial Intelligence

OpenAI Claims It Knows How to Build AGI and Samsung Bets on AI at CES 2025

The article reviews OpenAI CEO Sam Altman's statement that the company now knows how to build AGI, Samsung's AI‑focused product rollout at CES 2025, a Stanford tool for generating research‑based articles, and a Harvard study showing AI‑driven phishing attacks surpass a 50% success rate.

AGIAICES 2025
0 likes · 7 min read
OpenAI Claims It Knows How to Build AGI and Samsung Bets on AI at CES 2025
Open Source Linux
Open Source Linux
Nov 26, 2024 · Information Security

New “Silver Fox” Trojan Targets Chinese Users – How It Spreads and How to Defend

A recent advisory from China’s National Computer Virus Emergency Response Center reveals a new “Silver Fox” Trojan variant distributed via phishing pages and social‑media links, explains its infection process on Windows PCs, and outlines practical prevention steps for enterprises and individual users.

Silver Fox Trojancyber threatinformation security
0 likes · 5 min read
New “Silver Fox” Trojan Targets Chinese Users – How It Spreads and How to Defend
MaGe Linux Operations
MaGe Linux Operations
Nov 26, 2024 · Information Security

New “Silver Fox” Trojan Variant Targets Chinese Users – Spread, Impact, and Prevention

The National Computer Virus Emergency Response Center reports a new “Silver Fox” Trojan variant distributed via phishing links in WeChat groups, disguised as tax‑related installers, which can hijack systems for remote control and fraud, and provides concrete steps for users and enterprises to defend against it.

PreventionViruscybersecurity
0 likes · 6 min read
New “Silver Fox” Trojan Variant Targets Chinese Users – Spread, Impact, and Prevention
AntTech
AntTech
Mar 28, 2024 · Information Security

Web3 Phishing Attacks: Methods, Risks, and Countermeasures

This article examines the rapid rise of Web3 phishing, detailing various attack vectors such as transaction‑based phishing, eth_sign blind signing, modal phishing, approval abuse, address‑poisoning, and zero‑transfer tricks, while presenting detection methods and Ant Group’s multi‑dimensional anti‑money‑laundering platform as a countermeasure.

BlockchainSecurityWeb3
0 likes · 16 min read
Web3 Phishing Attacks: Methods, Risks, and Countermeasures
Open Source Linux
Open Source Linux
Apr 15, 2023 · Information Security

Understanding Phishing: Types, Tactics, and Prevention Strategies

This article explains how phishing exploits human psychology, outlines common phishing variants such as email, spear, whaling, business email compromise, smishing, vishing, social‑media, pharming and evil‑twin attacks, and provides practical measures to recognize and defend against them.

cyberattack preventionemail securityinformation security
0 likes · 10 min read
Understanding Phishing: Types, Tactics, and Prevention Strategies
Laravel Tech Community
Laravel Tech Community
Oct 20, 2022 · Information Security

The Importance of Phishing Email Simulations for Organizational Security

Recent research shows that nearly 60% of organizations suffered data loss due to employee email mistakes, highlighting the severe risks of phishing attacks and underscoring the need for realistic phishing simulation exercises to improve security awareness and protect against financial and reputational damage.

email securityphishingsecurity awareness
0 likes · 3 min read
The Importance of Phishing Email Simulations for Organizational Security
Sohu Tech Products
Sohu Tech Products
Sep 7, 2022 · Information Security

Phishing Techniques: Theory, Classification, and Defense Strategies

The article provides a comprehensive overview of phishing as a social‑engineering attack, detailing its various techniques—including email deception, spear‑phishing, whaling, malware‑based lures, domain spoofing, vishing, SMS and QR‑code scams—and offers practical defense measures such as anti‑phishing tools, multi‑factor authentication, content filtering, and security standards.

Defense Strategiesemail securitymalware
0 likes · 14 min read
Phishing Techniques: Theory, Classification, and Defense Strategies
Open Source Linux
Open Source Linux
Aug 3, 2022 · Information Security

Unmasking a Fake GitHub Leak: From Weak Passwords to a Red Team Backdoor

During a penetration testing exercise, the team discovered a cleverly disguised GitHub repository that leaked credentials, leading to a vulnerable admin interface, a malicious Python‑based VPN client which, after reverse‑engineering with PyInstaller extraction, revealed embedded shellcode hidden in images, allowing the attackers to trace the command‑and‑control server and pinpoint the origin of the intrusion.

gitHub leakageinformation securitymalware analysis
0 likes · 7 min read
Unmasking a Fake GitHub Leak: From Weak Passwords to a Red Team Backdoor
IT Services Circle
IT Services Circle
Apr 24, 2022 · Information Security

Inno Stealer Malware Disguised as Windows 11 Installer Targets Users

A new Inno Stealer malware campaign masquerades as a legitimate Windows 11 upgrade installer, using a spoofed Microsoft site to distribute an infected ISO that creates hidden scripts, disables security, and steals browser data and cryptocurrency wallets, posing a serious information‑security threat.

Inno StealerWindows 11information security
0 likes · 4 min read
Inno Stealer Malware Disguised as Windows 11 Installer Targets Users
Python Programming Learning Circle
Python Programming Learning Circle
Jun 26, 2021 · Information Security

Security Analysis and Exploitation of a QQ Phishing Website

The article documents a step‑by‑step security investigation of a QQ phishing site, detailing its fake login page, POST endpoint, Python‑based credential flooding, network reconnaissance, port scanning, vulnerability scanning, and discovery of the backend control panel, while discussing the challenges of XSS and brute‑force attacks.

Network ScanningWeb Securityinformation security
0 likes · 7 min read
Security Analysis and Exploitation of a QQ Phishing Website
MaGe Linux Operations
MaGe Linux Operations
Apr 4, 2021 · Information Security

Step‑by‑Step Analysis and Exploitation of a QQ Phishing Site

An in‑depth walkthrough demonstrates how to identify, analyze, and attack a QQ phishing website—revealing its URL, POST parameters, using Python to flood it with fake credentials, performing WHOIS, ping, nmap, and w3af scans, uncovering backend details, and discussing mitigation strategies.

Network ScanningPythonWeb Security
0 likes · 7 min read
Step‑by‑Step Analysis and Exploitation of a QQ Phishing Site
Huolala Tech
Huolala Tech
Nov 11, 2020 · Information Security

How Red Team Techniques Uncover Phishing Attack Origins: A Step‑by‑Step Guide

This article demonstrates how red‑team methods can be applied to phishing traceability, detailing phishing classifications, email‑header extraction, malicious site analysis, web‑shell decryption, privilege‑escalation techniques, log mining, and attacker attribution to reconstruct the full attack chain.

Red TeamWebshellemail analysis
0 likes · 33 min read
How Red Team Techniques Uncover Phishing Attack Origins: A Step‑by‑Step Guide
Liangxu Linux
Liangxu Linux
Oct 6, 2020 · Information Security

How I Uncovered a Phishing Mooncake Email Using Wireshark, Shodan, and OSINT

During the Mid‑Autumn Festival I received a seemingly harmless mooncake email, suspected it was a phishing test, and then used a virtual machine, network‑capture tools, Shodan, and open‑source intelligence to trace the malicious link back to its source and exposed the underlying infrastructure.

Network ReconnaissanceOSINTShodan
0 likes · 4 min read
How I Uncovered a Phishing Mooncake Email Using Wireshark, Shodan, and OSINT
Efficient Ops
Efficient Ops
Jan 16, 2020 · Information Security

What Are the Top 10 Cybersecurity Threats Predicted for 2020?

The article outlines ten major 2020 cybersecurity forecasts—including surging ransomware, sophisticated phishing, faster threat detection, expanding attack surfaces, emerging IoT security laws, stricter GDPR enforcement, OT security challenges, and the rise of managed security services—to help organizations prepare for the evolving threat landscape.

2020cybersecurityinformation security
0 likes · 13 min read
What Are the Top 10 Cybersecurity Threats Predicted for 2020?
21CTO
21CTO
Jun 13, 2019 · Information Security

Why HTTPS Isn’t a Guarantee of Safety: FBI’s Phishing Warning

The FBI warns that HTTPS sites are not automatically secure, as attackers exploit users' trust in the lock icon to launch sophisticated phishing campaigns via email, so users must verify links and never assume safety solely from the HTTPS indicator.

FBI warningemail safetyonline security
0 likes · 2 min read
Why HTTPS Isn’t a Guarantee of Safety: FBI’s Phishing Warning
Node Underground
Node Underground
Dec 23, 2018 · Information Security

Stop Phishing via target=_blank: Secure Links with rel=noopener & noreferrer

This article explains how using target="_blank" on links can expose pages to phishing attacks via the opener object, compares same‑origin and cross‑origin behaviors, and provides practical mitigation techniques such as Referrer‑Policy, rel="noreferrer" and rel="noopener" with fallback JavaScript.

Cross-OriginWeb Securityopener
0 likes · 9 min read
Stop Phishing via target=_blank: Secure Links with rel=noopener & noreferrer
ITPUB
ITPUB
Sep 19, 2017 · Artificial Intelligence

Are Hackers Already Weaponizing AI? Inside the ZeroFOX Experiment

A recent ZeroFOX experiment showed an AI system sending malicious tweets far faster than humans, prompting Elon Musk to highlight the growing threat of AI‑driven hacking, while security experts at Black Hat predict widespread AI weaponization in the near future.

AI ThreatsBlack HatZeroFOX
0 likes · 5 min read
Are Hackers Already Weaponizing AI? Inside the ZeroFOX Experiment
ITPUB
ITPUB
Sep 2, 2016 · Information Security

How Attackers Fake Chrome’s Address Bar to Trick Users in Full‑Screen Phishing

The article explains a new Chrome‑targeted phishing method that uses fullscreen mode and a carefully placed JPEG image to mimic the browser’s address bar and pop‑up dialogs, detailing the technique, visual cues, and security implications for users and researchers.

Browser SecurityChromefull-screen attack
0 likes · 8 min read
How Attackers Fake Chrome’s Address Bar to Trick Users in Full‑Screen Phishing
ITPUB
ITPUB
Nov 6, 2015 · Information Security

How I Decompiled a Malicious Android App and Uncovered Its Hidden Email Spy

A user received a suspicious SMS with a malicious app link, prompting an analyst to download, decompile, and dissect the Android malware, revealing hidden Device Admin permissions, obfuscated code, DES-encrypted credentials, and the attacker’s email address, ultimately exposing how the trojan steals personal data.

AndroidDES Encryptioninformation security
0 likes · 4 min read
How I Decompiled a Malicious Android App and Uncovered Its Hidden Email Spy