fp-3c
-
The npm package "fezbox" (alias janedu) disguises as a JS/TS utility library but hides credential-stealing code in a Cloudinary QR image. Discovered by Socket Threat Research, it uses reversed strings and obfuscation to evade detection—learn risks and defenses like CI/CD scanning and zero-trust dependencies.
-
Posted: September 22, 2025Views: 15Trend Micro warns of cybercriminals using AI to create fake CAPTCHA pages that trick users into revealing sensitive data, boosting phishing success rates and challenging cybersecurity defenses.
-
A sophisticated phishing attack uses Facebook’s URL redirect service to trick users into entering login credentials on fake pages, stealing emails, phone numbers, and passwords.
-
SpamGPT is a dark web “spam-as-a-service” platform using AI to automate large-scale phishing campaigns. Learn how KaliGPT and SMTP cracking training empower cybercriminals.
-
Qantas penalizes CEO Vanessa Hudson and top executives nearly A$800,000 (₹44.8 crore) in pay cuts following a cyberattack affecting 5.7 million customers. Learn about the breach, response, and governance reforms.
-
Chess.com confirms a data breach affecting 4,541 users, with hackers accessing personal information. Learn about the incident, user notifications, and security measures underway.
-
Farmers Insurance discloses a data breach impacting 1.1 million customers due to unauthorized access to a third-party vendor’s Salesforce-linked database. Learn about the exposed data, response actions, and identity protection tips.
-
Discover BruteForceAI, an innovative penetration testing tool that uses AI and browser automation to detect login pages and execute advanced brute-force attacks with intelligent evasion and logging.
-
Discover how the new GodRAT malware, derived from the Gh0st RAT codebase, infiltrates financial institutions using malicious screensaver and program files. Learn about its evolution and impact on security.
-
Discover how artificial intelligence is reshaping phishing tactics in cybercrime. Learn about AI-driven scams, deepfake technology, and the exploitation of messaging platforms.