Microsoft warns of a large-scale phishing-as-a-service operation

clock • 2 min read
Microsoft warns of a large-scale phishing-as-a-service operation
Image:

Microsoft warns of a large-scale phishing-as-a-service operation

The BulletProofLink operation runs an online portal, where customers can access services including hosting, templates and email campaigns

Researchers at Microsoft have detailed an extensive phishing-as-a-service (PHaaS) operation that not only sells phishing kits and email templates, but also provides criminals with hosting and other...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on Software

CISA issues warning on active exploitation of the PwnKit vulnerability

CISA issues warning on active exploitation of PwnKit Linux vulnerability

All US federal agencies that fall under the Federal Civilian Executive Branch are required to secure their systems against the bug by July 18

clock 30 June 2022 • 2 min read
The exploit means anyone can potentially locate secret military bases by uploading fake running data - underscoring the importance of IoT protection and security

Strava fitness app used to spy on Israeli military officials

The flaw has also exposed the locations of a number of sensitive sites in the country.

clock 21 June 2022 • 3 min read
Hertzbleed vulnerabiity in AMD and Intel CPUs could leak cryptographic keys

Hertzbleed vulnerabiity in AMD and Intel CPUs could leak cryptographic keys

Intel says an attack probably wouldn't work outside a lab environment

John Leonard
clock 16 June 2022 • 2 min read