Topics
![Illustrates the high-level flow a user follows to fall victim to these multi-step phishing campaigns that ultimately attempt to steal credentials.](https://keepaware.com/wp-content/uploads/2024/05/multi-step-phishing-campaign-300x139.png)
A Link, Click, and a Phish Away! Using Legitimate Domains for a Multi-Step Phishing Attack
Key points: Overview Keep Aware has observed phishing attacks that use legitimate domains to host links that eventually lead to a credential stealing web page.
![Google Looker Studio is being abused by bad actors to host intermediate phishing webpages.](https://keepaware.com/wp-content/uploads/2024/04/Google-Looker-Studio-image-4-300x183.png)
“Looking” for Documents? .. “Look” No Further: A New Trend in Abusing Google Looker Studio for Phishing
Keep Aware has uncovered evidence that Google Looker Studio is being abused by bad actors to host intermediate phishing pages.
![](https://keepaware.com/wp-content/uploads/2024/03/public-r2-buckets-featured-image-300x192.png)
Cloudflare R2, Public Buckets and a Phishing Binge: An Analysis of Today’s Threat Landscape
Cloudflare public R2 buckets are being abused to host phishing pages.
![Examples of abused Canva designs and of final phishing pages.](https://keepaware.com/wp-content/uploads/2024/02/Screenshot-2024-02-22-at-12.52.40-PM-300x163.png)
Clicking Links, From Canva Design to Phishing Site: An Analysis of Today’s Threat Landscape
Keep Aware’s Threat Research function shares recent analysis of Canva’s platform abuse for phishing purposes.
![Examples of abused Microsoft Dynamics 365 Customer Insights Journeys standalone forms.](https://keepaware.com/wp-content/uploads/2024/02/Screenshot-2024-02-12-at-10.59.37-AM-300x154.png)
The Abuse of Microsoft Dynamics 365 Standalone Forms: An Analysis of Today’s Threat Landscape
An analysis of Microsoft Dynamics 365 standalone forms reveals that, in today’s browsing threat landscape, 1 in 5 forms are threats.
![AI and Zero-Day Phishing](https://keepaware.com/wp-content/uploads/2024/02/zero_day_cybersecurity_phishing_email_purses_wallets-300x150.jpg)
AI and Zero-Day Phishing: Combating The Evolving Browser-Based Security Challenges
With the rise of generative AI usage across industries, no one should be surprised this trend also applies to the cybercriminal industry. They, too, are
![Security support scam website impersonating Apple.](https://keepaware.com/wp-content/uploads/2023/11/Screenshot-Apple-Security-Support-Scam-300x220.png)
Understanding Security Support Scams: A Comprehensive Analysis
Key Topics and Findings: Overview In today’s interconnected world where practically all employees use the internet, the prevalence of security support scams and other social
![Image of a Microsoft security scam site.](https://keepaware.com/wp-content/uploads/2023/11/Screenshot-2023-11-02-at-10.43.19-AM-300x164.png)
From Google Search to Microsoft Security Scam
Key Findings: Overview Keep Aware’s Threat Research division identified a recent batch of fraudulent Microsoft support sites. While these scam campaigns are not novel, they
![The Power of Pause in Cybersecurity](https://keepaware.com/wp-content/uploads/2023/10/The-Power-of-Pause-300x157.png)
Enhancing your Cybersecurity Posture with the Power of Pause
Taking a moment or pausing before taking action is not a new concept; it is ingrained in all of our technology. It is an essential
![Browser Notifications Hijacking Blog](https://keepaware.com/wp-content/uploads/2023/10/Browser-Notifications-Hijacking-300x157.png)
Browser Notifications Hijacking via DDoS-Protection Mimicry
Key Findings: Overview Keep Aware’s Threat Research team has identified a browser notifications hijacking campaign that impersonates a Russian-based distributed denial of service (DDoS) protection
![](https://keepaware.com/wp-content/uploads/2022/11/blog-notification-hijacking-300x150.png)
Browser Notifications Hijacking: A Trending Social Engineering Technique
Using Keep Aware Browser Security, our clients have detected an attack type that we have dubbed “Notification Hijacking.” These attacks involve malicious redirects that manipulate