Take action on the latest cybersecurity events

Cybersecurity advisories and events as they happen, with a clear action you can take.

On April 2, 2026, a phishing campaign targeting Balkans-region businesses was identified, using a local language fake invoice email with a spoofed attachment image that links to a malicious JavaScript file hosted on Discord's CDN. The multi-stage infection chain is consistent with a broader Malware-as-a-Service operation documented since late 2025.
A phishing campaign spoofs DocuSign notifications to redirect victims through a fake CAPTCHA gate to a cloned Google login page, aiming to steal Google Workspace credentials. The attack gains credibility and evades spam filters by appending a stolen legitimate email thread below the phishing lure and by sending to noreply@docusign.com which is only useful for the victim to recognize the domain.
The "GhostPairing Attack" is a social engineering campaign that exploits WhatsApp's device pairing feature by tricking victims into entering WhatsApp authentication codes via fake Facebook pages, authorizing attackers' browsers as linked devices with full access to messages and contacts. Most victims remain unaware that they have been compromised and their WhatsApp account becomes a vector to scam others.
An active phishing campaign uses weaponized Google Cloud Storage links and fake urgency warnings about account blocking to steal credentials and payment information from cloud storage users. The attack uses legitimate Google infrastructure to bypass email filters and firewalls.
Two phishing campaigns are reported targeting Microsoft and Atlassian users through homoglyph (typosquatting) domain spoofing using visually similar domains. The attacks use fake security alerts and ticket notifications to direct victims to credential-harvesting login pages. The scammers created valid SPF, DKIM, and SSL configurations, making them appear legitimate to both automated filters and users.
An active SMS and voice phishing campaign is targeting Apple users with fraudulent text messages impersonating Apple Support that claim suspicious transactions and direct victims to call a fake support number (+1 833-608-3976 instead of the legitimate 1-877-571-0223). Scammers attempt to steal Apple ID credentials, payment card information, or gain remote device access through social engineering tactics exploiting urgency and fear.
A malware campaign targeting Facebook users pushes fake account lockout warnings in advertisements that redirected victims to fraudulent support pages, where they are guided to copy and run PowerShell commands that download multi-stage malware hidden in images using steganography techniques.
Check Point Research identified the "ZipLine" social engineering campaign that uses extended multi-week professional conversations initiated through legitimate contact forms to build trust before delivering malicious ZIP files. The campaign has targeted dozens of U.S. industrial manufacturing and technology companies since May 2025, using legitimate domains and trusted file-sharing platforms to bypass security controls and impersonating potential business partners requesting NDAs or AI assessments.
Attackers from the ShinyHunters group breached Google's corporate Salesforce instance through social engineering that convinced employees to authorize malicious applications, and are now exploiting the stolen data to launch widespread phishing and voice phishing campaigns against Gmail users worldwide. Attackers impersonate Google employees to trick users into resetting passwords and sharing credentials.
Ransomware gangs are exploiting Microsoft Teams' default permissive external access settings to conduct sophisticated social engineering attacks. They flood victims with spam emails, then impersonate IT support via fake Microsoft tenants to trick users into executing malicious PowerShell commands that steal data and compromise systems.