Large-Scale Phishing Campaign Bypasses MFA
Attackers used adversary-in-the-middle attacks to steal passwords, hijack sign-in sessions and skip authentication and then use victim mailboxes to launch BEC attacks against other targets.
Attackers used adversary-in-the-middle attacks to steal passwords, hijack sign-in sessions and skip authentication and then use victim mailboxes to launch BEC attacks against other targets.
Victims instructed to make a phone call that will direct them to a link for downloading malware.
The heap buffer overflow issue in the browser’s WebRTC engine could allow attackers to execute arbitrary code.