Widespread credential phishing campaign abuses open redirector links Microsoft has been tracking a widespread credential phishing campaign using open redirector links, a feature that allows attackers to link to a trusted domain and embed...
Our Blog
Stay in the know with news and information published by Ideal Technologies and other top tech news outlets across the globe.
Using cross-domain threat data to disrupt a large BEC campaign
Microsoft 365 Defender researchers recently uncovered and disrupted a large-scale business email compromise (BEC) infrastructure hosted in multiple web services. Attackers used this cloud-based infrastructure to compromise mailboxes via...
Gootkit: the cautious Trojan
Gootkit is complex multi-stage banking malware that was discovered for the first time by Doctor Web in 2014. Initially, it was distributed via spam and exploits kits such as Spelevo and RIG. In conjunction with spam campaigns, the...