Phishing  2026()  2025()  2024()  2023()  2022()

DATE

NAME

INFO

CATEGORY

SUBCATE

11.5.26 Legitimate “Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security PHISHING PHISHING
3.5.26 Bluekit Meet Bluekit: The AI-Powered All-in-One Phishing Kit PHISHING KIT
2.5.26 AccountDumpling Hunting Down the Google-Sent Phishing Wave Compromising 30,000+ Facebook Accounts PHISHING PHISHING
18.4.26 SessionShark SessionShark Steals Session Tokens to Slip Past Office 365 MFA PHISHING PHISHING KIT
2.4.26 Bubble Bubble: a new tool for phishing scams PHISHING TOOLS
3.3.26 Starkiller Starkiller: New Phishing Framework Proxies Real Login Pages to Bypass MFA PHISHING KIT
17.1.26 Mamba Phishing-as-a-Service Kit INTRODUCTION CYFIRMA assesses that Mamba 2FA is a representative of a broader class of adversary-in-the-middle phishing frameworks that have become increasingly prevalen PHISHING KIT
2.1.26 Phishing Campaign Leverages Trusted Google Cloud Automation Capabilities to Evade Detection This report describes a phishing campaign in which attackers impersonate legitimate Google generated messages by abusing Google Cloud Application Integration to distribute malicious emails that appear to originate from trusted Google infrastructure. PHISHING PHISHING