Hackers Bypass Phishing Emails and Target Okta Identity Systems Instead

As email security tools became stronger, threat actors started looking for easier ways in — and they found one. Targeting identity providers like Okta through voice-based social engineering, a method known as vishing, proved far more effective than any email campaign

Hacker Uses Claude and ChatGPT to Breach Multiple Government Agencies

The integration of artificial intelligence allowed the attacker to turn unfamiliar networks into mapped targets in hours rather than days. Recovered materials showed the attacker possessed over 400 custom attack scripts.

Hackers Leverage Google Classroom in Phishing Attack Targeting Over 13,500 Organizations

The operation demonstrated significant scale and coordination, delivering a high volume of emails in just one week. The use of a widely used collaboration tool like Google Classroom allowed the attackers to reach a broad, multi-sector audience with minimal initial effort.

Hackers are looking to steal Microsoft logins using some devious new tricks – here’s how to stay safe | TechRadar

instead of sending victims directly to the site, which would probably get flagged by security solutions and quickly blocked, they used a Microsoft feature called Active Directory Federation Services (ADFS). Companies normally use it to connect their internal systems to Microsoft services.

New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP

This creates a timeline of connection attempts that helps investigators map brute-force activities and successful breaches.

CoGUI phishing platform sent 580 million emails to steal credentials

A new phishing kit named ‘CoGUI’ sent over 580 million emails to targets between January and April 2025, aiming to steal account credentials and payment data.

Microsoft warns of ransomware attacks on US healthcare | CSO Online

The threat actor borrowed initial access from a third-party infection to effect lateral movement within the victim system and place INC encryption on their network.

Don’t Fall for It: Hackers Pounce on CrowdStrike Outage With Phishing Emails | PCMag

Banks and health-care providers saw their services disrupted and TV broadcasters went offline as businesses worldwide grappled with the ongoing outage. Air travel has been hit hard, too, with planes grounded and services delayed.

‘This happens frequently,’ AARP Alabama warns of Venmo, Cash App scams

Scammers are using payments apps, like Venmo and Cash App, to swipe innocent people’s money. AARP Alabama says there are multiple mobile payment scams going around right now, and one scam takes place directly in your app.

Six Types of Social Engineering Attacks

Some examples of social engineering attacks include phishing, pretexting, scareware, baiting, vishing, smishing and CEO fraud. If you are unsure what qualifies as social engineering, imagine how many ways someone can manipulate you to reveal private information. Threat actors use these psychological techniques, both in person and online, to gain access to your personal or organizational information. These bad actors can install malware on your device, steal your information and even take your identity.