Category: TheCyberExpress

HTML phishing attack, Telegram bot credential theft, self-contained phishing malware, JavaScript credential harvesting, email security bypass techniques, RFQ phishing scams, invoice phishing attacks, Adobe login phishing, Microsoft credential theft, FedEx phishing campaign, DHL impersonation attack, Central Europe phishing 2025, Eastern Europe cyber threats, Cyble threat intelligence, CryptoJS AES obfuscation, anti-forensics phishing, F12 developer tools blocking, Telegram Bot API abuse, api.telegram.org malicious traffic, credential phishing 2025, HTML attachment malware, business email compromise, targeted phishing campaign, Czech Republic cyber threats, Slovakia phishing attacks, Hungary cybersecurity threats, Germany phishing campaign, Telekom Deutschland phishing, manufacturing sector attacks, automotive industry phishing, government agency phishing, energy utility cyber threats, telecommunications phishing, professional services attacks, garclogtools_bot, v8one_bot, dollsman_bot, dual-capture credential theft, fake login error messages, IP address harvesting, api.ipify.org abuse, ip-api.com malicious use, YARA phishing detection, phishing IOCs 2025, HTML file security risks, RFC-compliant filename spoofing, blurred document phishing, modal login phishing, brand impersonation attacks, CryptoJS malware obfuscation, right-click blocking malware, keyboard shortcut interception, multi-stage credential theft, decentralized phishing infrastructure, phishing toolkit generators, modular phishing templates, German language phishing, Spanish phishing variants
11
Nov
2025

HTML Phishing Uses Telegram Bots To Steal Corporate Credentials

Cybersecurity researchers at Cyble have uncovered an extensive phishing campaign that represents a significant evolution in credential theft tactics. The…

Digital Life Certificate 4.0
10
Nov
2025

Digital Life Certificate 4.0: Cyber Alert For Pensioners

The Government of India’s Department of Pension & Pensioners’ Welfare (DoPPW) has launched the Digital Life Certificate (DLC) Campaign 4.0,…

Comparison of malicious AI tools
07
Nov
2025

AI Malware Detected In The Wild As Threats Evolve

AI malware may be in the early stages of development, but it’s already being detected in cyberattacks, according to new…

Israeli defense contractor hacked
05
Nov
2025

Threat Group Claims Breach Of Israeli Defense Contractor

An Iran-linked threat group claims to have accessed the security cameras of an Israeli defense contractor and leaked videos of…

supply chain attacks set records
04
Nov
2025

Software Supply Chain Attacks Set Records In October

Software supply chain attacks hit levels in October that were more than 30% higher than any previous month. Threat actors…

countries most attacked by hacktivist groups
04
Nov
2025

Hacktivist Attacks On Critical Infrastructure Soar: Cyble

Hacktivist attacks on critical infrastructure doubled over the course of the third quarter, according to a new Cyble report. Hacktivist…

BadCandy
31
Oct
2025

Hundreds Of Australian Devices Compromised With BadCandy Implant

BadCandy, a Persistent Access Threat to Network Edge Devices BadCandy is a Lua-based web shell implant deployed on compromised Cisco…

Qilin ransomware group TTPs
27
Oct
2025

Qilin Ransomware Group TTPs Examined By Researchers

The Qilin ransomware group has been by far the most active ransomware group over the last seven months, so two…

ransomware attacks September 2025
24
Oct
2025

Ransomware Attacks Have Soared This Year

Ransomware attacks have soared 50% in 2025 despite major changes among the leading ransomware groups, according to a new Cyble…

riskiest cyberattack surfaces
21
Oct
2025

Ransomware Payments Get Bigger Even As Fewer Pay

Fewer organizations are paying the ransom when confronted with a ransomware attack – but those that do make ransomware payments…

MANGO Data Breach
16
Oct
2025

Mango Data Breach Confirms Exposure Of Limited Customer Info

Spanish fashion retailer Mango has confirmed a data breach after one of its external marketing service providers suffered unauthorized access…

Low VT detection
15
Oct
2025

Fake RTO Apps Target Indian Android Users

A new trend of Android malware is sweeping across India, leveraging the guise of Regional Transport Office (RTO) apps to…