Our Blog

Stay in the know with news and information published by Ideal Technologies and other top tech news outlets across the globe.

Widespread Credential Phishing Campaign

Widespread Credential Phishing Campaign

Widespread credential phishing campaign abuses open redirector links Microsoft has been tracking a widespread credential phishing campaign using open redirector links, a feature that allows attackers to link to a trusted domain and embed...

Using cross-domain threat data to disrupt a large BEC campaign

Using cross-domain threat data to disrupt a large BEC campaign

Microsoft 365 Defender researchers recently uncovered and disrupted a large-scale business email compromise (BEC) infrastructure hosted in multiple web services. Attackers used this cloud-based infrastructure to compromise mailboxes via...

Gootkit: the cautious Trojan

Gootkit: the cautious Trojan

Gootkit is complex multi-stage banking malware that was discovered for the first time by Doctor Web in 2014. Initially, it was distributed via spam and exploits kits such as Spelevo and RIG. In conjunction with spam campaigns, the...