Latest news

Criminal IP and IPLocation.io collaborate for enhanced IP solutions
Phishing

Criminal IP and IPLocation.io collaborate for enhanced IP solutions

14 September 2024 dark6

Criminal IP, a leading cyber threat intelligence (CTI) search engine, has integrated its IP risk detection data with IPLocation.io, a...
Phishing attacks get smarter: attackers exploit HTTP response headers
Phishing

Phishing attacks get smarter: attackers exploit HTTP response headers

12 September 2024 dark6

Cybersecurity researchers at Unit 42 have uncovered a sophisticated new phishing technique that leverages HTTP response headers to deliver malicious...
Preta Power: innovative tools empower cyber enhancement initiatives
Spyware

Preta Power: innovative tools empower cyber enhancement initiatives

10 September 2024 dark6

Earth Preta, the notorious Chinese Advanced Persistent Threat (APT) group, has been active for over a decade, targeting government entities,...
Booking.com phishing attack: understanding the threat and protecting yourself
Phishing

Booking.com phishing attack: understanding the threat and protecting yourself

5 September 2024 dark6

In recent months, a highly sophisticated phishing attack targeting Booking.com has emerged, raising alarms among hotel managers and travelers alike....
Increasing phishing threats targeting Microsoft OneDrive users
Phishing

Increasing phishing threats targeting Microsoft OneDrive users

1 August 2024 dark6

In an emerging and sophisticated phishing campaign identified by the Trellix Advanced Research Center, Microsoft OneDrive users are facing a...
EchoSpoofing campaign exploits Proofpoint vulnerability
Vulnerability

EchoSpoofing campaign exploits Proofpoint vulnerability

30 July 2024 dark6

An unknown attacker exploited a vulnerability in Proofpoint’s email routing settings to send mass fraudulent messages impersonating well-known companies such...
The Silent Warfare within Outlook’s Secure Walls
Phishing

The Silent Warfare within Outlook’s Secure Walls

4 December 2023 dark6

Explore the hidden dangers within Outlook as Check Point security researchers reveal the silent warfare of hyperlinks, attachments, and passive...