While such information about suspected American hacking is sparse, the U.S. government’s cyber agencies and Western tech companies routinely publish details on China-linked cyberattackers. @LovelaceRyanD reports for #ThreatStatus: https://t.co/Oki6rsjFPj
🗞️Our weekly cybersecurity news roundup 👉The Good: Chrome and Mozilla release patches for several high-severity memory safety vulnerabilities. The Bad: Latest version of ‘Darcula’ PhaaS now auto-generates phishing kits that can impersonate any brand. The Ugly: Russia-linked… https://t.co/UbJq5AdnJa
A new version of the phishing-as-a-service (PhaaS) tool known as "darcula" enables scammers to build custom phishing pages that impersonate any other website with just a link, according to @Netcraft. #cybersecurity #infosec #ITsecurity https://t.co/4JJhiW3W4T
A new version of the phishing-as-a-service (PhaaS) tool, Darcula v3, has emerged, allowing cybercriminals to clone any brand's landing page with minimal technical expertise. Attackers can create a phishing site that mimics a legitimate brand's appearance in just 10 minutes, significantly increasing the threat to unsuspecting users. This development has been reported by various cybersecurity sources, including The Hacker News and SC Magazine, which highlight the tool's ability to generate custom phishing pages that impersonate any website with just a link. Additionally, the cybersecurity community is monitoring the implications of this tool amid ongoing discussions about international cyber threats, including potential retaliatory actions by the U.S. against China for hacking activities.