AI phishing, malicious SVGs continues after surge over holidays
AI phishing, malicious SVGs continues after surge over holidays
#Aiphishing #Phishingemails

https://opr.news/106e2742260313en_us?link=1&client=ex_global

Download Now
https://opr.as/share

AI phishing, malicious SVGs continues after surge over holidays

A report based on millions of phishing emails reported to Hoxhunt in 2025 and early 2026 revealed a massive surge in AI-generated phishing attempts at the end of last year, as well as a 50-fold increase in malicious SVG attachments. The Hoxhunt Phishing Trends Report, released Thursday, noted that AI-generated content made up less than 5% of phishing attempts for the first 11 months of 2025, but rose to 56% during the December 2025 holiday season, a 14-fold increase.

opera news app

Tips from Nadiyno.org: how to recognise dangerous attachments in emails and protect yourself

https://peertube.eqver.se/w/iWZ4NyZS9zpXwiqUZNat2S

Nadyino_qa_1_004_en

PeerTube
Beware of npm Phishing Emails Targeting Developer Credentials

An developer recently came across a highly advanced phishing email that spoofs the [email protected] address in order.

GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Exploitation of Microsoft 365 Direct Send to Deliver Phishing Emails as Internal Users

A phishing campaign targeting over 70 organizations, predominantly in the US, has been uncovered by Varonis’ MDDR Forensics team.

GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Most cyber attacks start with an email where criminals pretend to be someone you know.

If you don’t want to fall victim (and trust me, you don’t), you and your team need to know how to spot them.

Here’s how…

#PhishingEmails #CyberCrime #DataSecurity

Phishing emails pretending to be from Microsoft trick you into sharing information or clicking harmful links. Train your team to spot fake emails and use multi-factor authentication to keep your business protected

#PhishingEmails #CyberSecurity
https://www.techrepublic.com/article/spoof-microsoft-notifications-2024/

Over 5,000 Fake Microsoft Notifications Fueling Email Compromise Campaigns

Check Point documented 5,000 spam emails coming from legitimate-looking domains as fake Microsoft application alerts. Real links complete the trap.

TechRepublic

Scammers are using the typo “rnicrosoft” instead of “microsoft” to trick you into handing over passwords or financial details. Always double-check email addresses, and train your team to spot phishing scams

#Microsoft #CyberSecurity #PhishingEmails https://windowsreport.com/microsoft-scammers-are-now-using-the-rnicrosoft-typo-to-hack-accounts/

Scammers are now using the rnicrosoft typo to hack Microsoft accounts

rnicrosoft is the latest hacking trend that it's not only in your face, but also very effective, and simple. Pay close attention!

Windows Report
Okay. Stupid question for anyone who can answer:

Is there anything I can do about
#PhishingEmails other than just block them/mark as spam? Like, Thunderbird correctly flags these emails as junk mail, and since this is one of my emails on one of my domains, I can go into my hosting control panel and block the email address and/or domain it comes from... but the last time I notified my hosting provider, they were just like "That looks like phishing! Don't click that!" even though I literally told them I knew that's what it was, and I wanted to let them know because the phisher was attempting to convince me they were my host.

Like, is it worth plugging these domains into a whois look up and see who the registrar is and report abuse to them or...?

How to Spot and Avoid Phishing Emails: Indie Author Guidance

Following our recent #AskALLi advice post on indie author scams, we're following up with detailed guidance for spotting phishing emails.

The Self-Publishing Advice Center

Spent a few hours updating my #IOC collection on my #GitHub repositories. Added a long list of IOCs from #DocuSign #PhishingEmails here: https://github.com/Geekmaster-General/IOCs/blob/main/DocuSign%20IOCs

Also added a new section called "Phishing Email IOCs" which you can find here: https://github.com/Geekmaster-General/IOCs/blob/main/Phishing%20Email%20IOCs

This covers the infamous "Password Reset", "Microsoft Teams File", "Storage if Full", "Messages on Hold", and "SharePoint Document" phishing emails we all see from time to time.

#cyberdefense #cybersecurity #securitymanagement

IOCs/DocuSign IOCs at main · Geekmaster-General/IOCs

Storage for the IOCs I collect. Contribute to Geekmaster-General/IOCs development by creating an account on GitHub.

GitHub