Skip to main content
← All Articles

Tag

#Phishing

5 articles

Advertisement

TOAD Emails: The 'Call This Number' Gateway Bypass Threat
HIGH
Threat Intel

TOAD Emails: The 'Call This Number' Gateway Bypass Threat

Attackers use Telephone-Oriented Attack Delivery (TOAD) with 'call this number' emails to bypass gateways, relying on social engineering post-call.

Runtime Rebel Intel
4 min read·Feb 25, 2026
VU
MEDIUM
Vulnerabilities

Open Redirects: Overlooked Vulnerability Impact & Analysis

An analysis of open redirect vulnerabilities, their historical context in OWASP, common exploitation vectors like phishing, and essential mitigation strategies.

Runtime Rebel Intel
4 min read·Feb 25, 2026
TH
HIGH
Threat Intel

AI-Enabled Threats: Model Extraction, APT Phishing, & Malware Evolution

GTIG reports on Q4 2025 AI threats: rising model extraction, APTs using AI for reconnaissance and phishing, and new AI-integrated malware families like HONESTCUE and

Runtime Rebel Intel
9 min read·Feb 25, 2026
TH
HIGH
Threat Intel

Typosquatting: Deceptive Domains for Credential Theft & Malware

Analysis of typosquatting campaigns leveraging deceptive domain names for phishing, credential harvesting, and malware delivery, bypassing traditional detections.

Runtime Rebel Intel
4 min read·Feb 25, 2026
UAC-0050 Targets European Financial Institutions with RMS Malware
HIGH
Threat Intel

UAC-0050 Targets European Financial Institutions with RMS Malware

Russia-aligned actor UAC-0050 expands operations beyond Ukraine, targeting European financial entities with spoofed domains and RMS malware for espionage.

Runtime Rebel Intel
4 min read·Feb 25, 2026