Google Docs Forms Abused by Phishers to Harvest Microsoft Credentials

Security researchers detected several phishing campaigns that leveraged a Google Docs Form to target users’ Microsoft credentials. Cofense observed that the phishing emails originated from a compromised email account with privileged access to fin… Continue reading Google Docs Forms Abused by Phishers to Harvest Microsoft Credentials

Ghost Phisher – Phishing Attack Tool With GUI

Ghost Phisher is a Wireless and Ethernet security auditing and phishing attack tool written using the Python Programming Language and the Python Qt GUI library, the program is able to emulate access points and deploy. The tool comes with a fake DNS server, fake DHCP server, fake HTTP server and also has an integrated area […]

The post Ghost…

Read the full post at darknet.org.uk

Continue reading Ghost Phisher – Phishing Attack Tool With GUI

How not to phish a security researcher on Twitter

What happens when a phisher decides to try and directly phish a security researcher on Twitter? This.
Categories:
Cybercrime
Social engineering
Tags: DMphishphisherphishingtwitter

(Read more…)

The post How not to phish a security researcher on T… Continue reading How not to phish a security researcher on Twitter