Tag
high
advisory
SaaS Notification Pipeline Abuse for Phishing and Spam Campaigns
3 rules 1 TTP 5 IOCsAttackers are abusing notification pipelines in SaaS platforms like GitHub and Jira to deliver phishing and spam emails by exploiting legitimate platform features and bypassing traditional email security measures.
saas-abuse
phishing
credential-harvesting
github
jira
3r
1t
5i
medium
advisory
Democratization of Business Email Compromise (BEC) Attacks
2 rules 2 TTPs 1 CVE 6 IOCsAttackers are leveraging AI to rapidly reconnoiter and tailor content for smaller organizations, making it easier to execute business email compromise (BEC) scams and scam smaller sums from many victims, as demonstrated by a recent attack targeting a small community organization.
business-email-compromise
bec
ai
social-engineering
credential-harvesting
exploitation
2r
2t
1c
6i