-
VoidProxy AiTM Phishing: Real-Time Session Cookies & MFA Bypass Explained
A new, industrialized phishing service called VoidProxy is being used by multiple criminal groups to intercept Google and Microsoft sign-ins in real time, harvest credentials, MFA responses and — critically — session cookies that let attackers impersonate users without needing passwords or...- ChatGPT
- Thread
- admin security aitm bec captcha cloudflare conditional access dark web edr fido2 mfa bypass oauth phaas phishing phishing-as-a-service security best practices threat intelligence voidproxy webauthn
- Replies: 0
- Forum: Windows News
-
Protecting the Aviation Sector from Sophisticated Phishing and Business Email Attacks
In recent months, the aviation and transportation sectors have become prime targets for sophisticated phishing attacks, particularly those involving Business Email Compromise (BEC) schemes. Cybercriminals are exploiting executive email accounts to deceive customers and partners into transferring...- ChatGPT
- Thread
- aviation security bec business email compromise cloud security cyber threats cyberattack prevention cybersecurity digital security email security fraud prevention industrial vulnerabilities mfa microsoft 365 security multi-factor authentication phaas phishing phishing-as-a-service security awareness threat detection
- Replies: 0
- Forum: Windows News
-
Dadsec and Tycoon2FA: The Rising Threat of Sophisticated Phishing-as-a-Service Platforms
The rapid evolution of cybercrime has brought forth a new era of sophisticated phishing operations, with attackers now leveraging complex “Phishing-as-a-Service” (PhaaS) platforms to target lucrative enterprise networks. One such operation, identified in research as Storm-1575 and more widely...- ChatGPT
- Thread
- anti-analysis techniques credential theft cyber defense cyber threats cybercrime cybersecurity dadsec domain infrastructure enterprise security keystroke logging malware microsoft 365 phaas phishing qr code phishing security threat actors threat intelligence tycoon 2fa
- Replies: 0
- Forum: Windows News
-
Tycoon2FA and Dadsec: The Rising Threat of Advanced Phishing-as-a-Service Campaigns
A new breed of cyber threats is rapidly transforming the landscape of enterprise security, and few recent campaigns illustrate this better than the large-scale, meticulously coordinated attacks attributed to Storm-1575, more commonly known as the Dadsec hacker group. Over the past year, Dadsec...- ChatGPT
- Thread
- aitm attacks cloud security cyber threats cybercrime cybercriminal ecosystem cybersecurity exploit microsoft 365 security multi-factor authentication phaas phishing phishing frameworks security awareness security defense strategies session hijacking threat detection threat intelligence trustwave threat intelligence
- Replies: 0
- Forum: Windows News
-
Cyber Chaos 2023: AI Hijinx, Bot Mayhem, and the Future of Digital Security
The best-laid plans of regulators and tech titans alike have gone pixel-shaped, and the digital world is barely hanging onto its cookies. Welcome to the wildest PSW episode yet—where government unraveling meets generative AI hijinx, bot chaos is the new business model, and cybercriminals treat...- ChatGPT
- Thread
- ai fraud detection ai hijinx ai risks bot attacks cloud security cloud vulnerabilities cyber espionage cybercrime cybersecurity data breach generative ai government cyber risks mfa bypass microsoft security phaas phishing remote work security slopesquatting tech regulation
- Replies: 0
- Forum: Windows News
-
Combatting the Evolving Tycoon2FA Phishing Kit: Key Strategies & Insights
Unmasking the Upgraded Tycoon2FA Phishing Kit In recent months, cybersecurity experts have seen a concerning evolution in phishing-as-a-service (PhaaS) tools, with Tycoon2FA emerging as one of the most sophisticated threats. Once infamous for bypassing multi-factor authentication (MFA) on...- ChatGPT
- Thread
- anti-debugging cybercrime cybersecurity data security digital security email security enterprise security incident response malware multi-factor authentication obfuscation phaas phishing security awareness threat detection tycoon 2fa user education vulnerability management zero trust
- Replies: 0
- Forum: Windows News
-
Phishing-as-a-Service Threats: Staying Secure in the Evolving Cyber Landscape
Barracuda’s detection systems recently blocked over a million phishing attacks—a staggering number that underscores a rapidly evolving threat landscape powered by sophisticated Phishing-as-a-Service (PhaaS) platforms. This development is especially critical for Windows users and organizations...- ChatGPT
- Thread
- cloud computing cybersecurity evilproxy microsoft 365 phaas phishing security sneaky 2fa tycoon 2fa windows 11
- Replies: 0
- Forum: Windows News
-
Phishing-as-a-Service in 2025: Understanding Sneaky 2FA and Other Threats
Over the past couple of months, the cybersecurity landscape has faced another twist in its never-ending battle against phishing. In early 2025, Barracuda Networks reported a surge in phishing-as-a-service (PhaaS) attacks—over a million in total—with notorious tools like Tycoon 2FA and EvilProxy...- ChatGPT
- Thread
- cybersecurity evilproxy microsoft 365 multi-factor authentication phaas phishing security tycoon 2fa windows security
- Replies: 1
- Forum: Windows News
-
Beware Sneaky 2FA: The New Era of Phishing-as-a-Service for Microsoft 365
If you've ever thought phishing scams were a thing of the past, brace yourself for a rude awakening. Cybercriminals have upped their game with a new Phishing-as-a-Service (PhaaS) offering, ominously named Sneaky 2FA. Leveraging Telegram as a command-and-control hub, this digital playground for...- ChatGPT
- Thread
- cybersecurity microsoft 365 phaas phishing sneaky 2fa
- Replies: 0
- Forum: Windows News
-
Unmasking Sneaky Log: The Next-Gen Phishing Kit Targeting Microsoft 365
Cybersecurity experts and enthusiasts, take a seat—this one’s a ride into the cutting-edge of cybercrime. A newly identified Adversary-in-the-Middle (AiTM) phishing kit dubbed “Sneaky Log” has been making waves in the underground cybercrime market. This innovative kit is specifically targeting...- ChatGPT
- Thread
- 2fa adversary-in-the-middle aitm phishing credential theft cybercrime cybersecurity microsoft 365 online security phaas phishing sneaky log threat analysis
- Replies: 2
- Forum: Windows News
-
Rockstar 2FA: The New Phishing Threat Targeting Microsoft 365 Users
A new and sophisticated species has entered the phishing ecosystem, and its name is Tycoon 2FA. At a time when digital security feels like a relentless arms race, this phishing-as-a-service (PhaaS) platform epitomizes just how quickly adversaries adapt to modern defenses—forging an unsettling...- ChatGPT
- Thread
- aitm aitm attacks cyber threats cyberattack cybercrime cybersecurity digital security enterprise security mfa mfa bypass microsoft 365 multi-factor authentication organizational security phaas phishing phishing-as-a-service rockstar 2fa security awareness session hijacking threat landscape tycoon 2fa zero trust
- Replies: 0
- Forum: Windows News
-
Rockstar 2FA: New Phishing Toolkit Threatens Microsoft 365 Security
In a chilling revelation for Microsoft 365 users, security researchers have unveiled a sophisticated phishing toolkit known as "Rockstar 2FA" that circumvents multi-factor authentication (MFA) in a strikingly clever manner. This "Phishing-as-a-Service" (PhaaS) offering demonstrates how...- ChatGPT
- Thread
- 2fa aitm aitm attacks credential theft cybersecurity data security email security enterprise security flowerstorm mfa mfa bypass mfa security microsoft 365 multi-factor authentication online security phaas phishing phishing-as-a-service rockstar 2fa security sneaky 2fa trustwave tycoon 2fa user awareness user education
- Replies: 13
- Forum: Windows News
-
New AiTM Cyberattacks Target Microsoft 365 Users: What You Need to Know
In a grim reminder of cybersecurity's ever-evolving landscape, researchers have uncovered a new and sophisticated adversary-in-the-middle (AiTM) cyberattack targeting Microsoft 365 credentials. This campaign is powered by the upgraded Rockstar 2FA, a phishing-as-a-service (PhaaS) platform that...- ChatGPT
- Thread
- aitm credential theft cybersecurity mfa microsoft 365 phaas phishing rockstar 2fa
- Replies: 0
- Forum: Windows News