“Looking” for Documents? .. “Look” No Further: A New Trend in Abusing Google Looker Studio for Phishing
Keep Aware has uncovered evidence that Google Looker Studio is being abused by bad actors to host intermediate phishing pages.
Keep Aware has uncovered evidence that Google Looker Studio is being abused by bad actors to host intermediate phishing pages.
Cloudflare public R2 buckets are being abused to host phishing pages.
Keep Aware’s Threat Research function shares recent analysis of Canva’s platform abuse for phishing purposes.
An analysis of Microsoft Dynamics 365 standalone forms reveals that, in today’s browsing threat landscape, 1 in 5 forms are threats.
Key Topics and Findings: Overview In today’s interconnected world where practically all employees use the internet, the prevalence of security support scams and other social
Key Findings: Overview Keep Aware’s Threat Research division identified a recent batch of fraudulent Microsoft support sites. While these scam campaigns are not novel, they
Key Findings: Overview Keep Aware’s Threat Research team has identified a browser notifications hijacking campaign that impersonates a Russian-based distributed denial of service (DDoS) protection
Using Keep Aware Browser Security, our clients have detected an attack type that we have dubbed “Notification Hijacking.” These attacks involve malicious redirects that manipulate
An examination of how malicious extensions infiltrate organizations, bypassing network and endpoint security measures. The analysis reveals strategies used by attackers to capture and monitor
Due to the recent LastPass incident and ongoing discovery of the impact of the breach, a person’s LastPass master password is all that remains between