TAG-150 is a sophisticated threat actor that has been deploying CastleLoader, CastleBot, and the newly identified CastleRAT since March 2025, leveraging a multi-tiered infrastructure and advanced phishing tactics.| blog.polyswarm.io
The OpenID Foundation continues to support government partners, with the OpenID Foundation’s Chairman Nat Sakimura recently leading the organization’s expert guidance to Japan’s Financial Services Agency (FSA) on strengthening cybersecurity defences for securities and trading companies facing sophisticated phishing attacks. Japanese financial firms have been experiencing increasingly sophisticated phishing and unauthorized access attacks, prompting the […] The post OIDF supports Japan...| OpenID Foundation
The vulnerability, a directory traversal bug, was addressed in WinRAR version 7.13.| CySecurity News - Latest Information Security and Hacking Incidents
Breakdown of the most common types of phishing attacks, real breach examples, and how to detect them before damage is done.| GCS Technologies
Devil-Traff is a new bulk SMS platform enabling phishing campaigns with features like sender ID spoofing, API automation, and support for spam, facilitating large-scale cyberattacks at low cost.| SlashNext | Complete Generative AI Security for Email, Mobile, and Browser
PhishWP creates fake payment pages that look like trusted services. It's used as a phishing trap to steal sensitive information such as credit card numbers, personal data, and browser metadata.| SlashNext | Complete Generative AI Security for Email, Mobile, and Browser
There are many different types of phishing attacks, including executive phishing, whaling phishing, smishing, and vishing.| CenturyLink