Tag: domain abuse
3 attack reports | 0 vulnerabilities
Attack reports
More Than Just a Corporate Wiki? How Threat Actors are Exploiting Confluence
Threat actors are increasingly using legitimate third-party business software to evade detection and maintain deception. Atlassian's Confluence is being exploited to host malicious content, leveraging its trusted domain status. The attack involves an email with an Excel attachment containing a Docu…
Downloadable IOCs 2
Phishing Via Typosquatting and Brand Impersonation: Trends and Tactics
From February to July 2024, an analysis of over 500 popular domains revealed more than 10,000 malicious lookalike domains employing typosquatting and brand impersonation techniques. Google, Microsoft, and Amazon were the most targeted brands, accounting for nearly 75% of phishing domains. Almost ha…
Downloadable IOCs 10
Exploring Newly Released Top-Level Domains
An investigation into 19 new top-level domains (TLDs) released in the past year revealed various malicious activities, including phishing campaigns, distribution of potentially unwanted programs, torrenting websites, and pranking campaigns. The study found a correlation between the TLDs' general av…
Downloadable IOCs 22
More Than Just a Corporate Wiki? How Threat Actors are Exploiting Confluence
Threat actors are increasingly using legitimate third-party business software to evade detection and maintain deception. Atlassian's Confluence is being exploited to host malicious content, leveraging its trusted domain status. The attack involves an email with an Excel attachment containing a Docu…
Downloadable IOCs 2
Phishing Via Typosquatting and Brand Impersonation: Trends and Tactics
From February to July 2024, an analysis of over 500 popular domains revealed more than 10,000 malicious lookalike domains employing typosquatting and brand impersonation techniques. Google, Microsoft, and Amazon were the most targeted brands, accounting for nearly 75% of phishing domains. Almost ha…
Downloadable IOCs 10
Exploring Newly Released Top-Level Domains
An investigation into 19 new top-level domains (TLDs) released in the past year revealed various malicious activities, including phishing campaigns, distribution of potentially unwanted programs, torrenting websites, and pranking campaigns. The study found a correlation between the TLDs' general av…
Downloadable IOCs 22
More Than Just a Corporate Wiki? How Threat Actors are Exploiting Confluence
Threat actors are increasingly using legitimate third-party business software to evade detection and maintain deception. Atlassian's Confluence is being exploited to host malicious content, leveraging its trusted domain status. The attack involves an email with an Excel attachment containing a Docu…
Downloadable IOCs 2
Phishing Via Typosquatting and Brand Impersonation: Trends and Tactics
From February to July 2024, an analysis of over 500 popular domains revealed more than 10,000 malicious lookalike domains employing typosquatting and brand impersonation techniques. Google, Microsoft, and Amazon were the most targeted brands, accounting for nearly 75% of phishing domains. Almost ha…
Downloadable IOCs 10
Exploring Newly Released Top-Level Domains
An investigation into 19 new top-level domains (TLDs) released in the past year revealed various malicious activities, including phishing campaigns, distribution of potentially unwanted programs, torrenting websites, and pranking campaigns. The study found a correlation between the TLDs' general av…
Downloadable IOCs 22