Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials - Cyber Security News

The Kusto-style query above, adapted from Evalian’s SOC rules, triangulates sender reputation, anomalous reply-to domains, malicious top-level infrastructure and the shared JARM signature, delivering high-fidelity alerts without drowning analysts in noise. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Evalian analysts noted that, while the façade looks benign, the domain redbull-social-media-manager.apply-to-get-hired.com is barely weeks old and resolves to a VPS in AS-63023, a network notorious for short-lived malicious infrastructure. While job hunters remain the prime targets, organizations should block the listed IOCs, monitor outbound traffic for 38.114.120.167, and teach users that even emails passing every authentication test may still be a wolf in well-forged clothing. The attackers abuse Mailgun’s high-reputation IP pool, letting them inherit Xero’s trust halo while hiding the real reply-to address [email protected]. Disguised as personalized invitations, the messages originate from [email protected] and sail through SPF, DKIM and DMARC checks, giving traditional filters little reason to distrust them. Evalian researchers identified the same TLS JARM fingerprint across sibling domains spoofing MrBeast and Meta, proving the campaign is a rentable kit rather than a lone one-off. Tushar is a Cyber security content editor with a passion for creating captivating and informative content. Those credentials never reach Facebook; instead they disappear into a backend that often returns a 504 Gateway Timeout, a stalling manoeuvre that frustrates sandboxes and masks successful exfiltration.

This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 15 Jul 2025 06:50:11 +0000


Cyber News related to Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials - Cyber Security News

'ResumeLooters' Attackers Steal Millions of Career Records - Attackers used SQL injection and cross-site scripting to target at least 65 job-recruitment and retail websites with legitimate penetration-testing tools, stealing databases containing more than 2 million emails and other personal records of job ...
1 year ago Darkreading.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
2 weeks ago Cybersecuritynews.com
Threat Actors Attacking Job Seekers With Three New Unique Adversaries - Their analysis revealed that operators typically employ multiple personas throughout the scam lifecycle – one to make initial contact and another to execute the fraud – allowing them to efficiently manage high volumes of victims while ...
2 months ago Cybersecuritynews.com
Spear Phishing vs Phishing: What Are The Main Differences? - Almost half of them used phishing to obtain the passwords of users. Highly targeted phishing campaigns against specific individuals or types of individuals are known as spear phishing. It's important to be able to spot phishing in general. For ...
1 year ago Techrepublic.com
Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials - Cyber Security News - The Kusto-style query above, adapted from Evalian’s SOC rules, triangulates sender reputation, anomalous reply-to domains, malicious top-level infrastructure and the shared JARM signature, delivering high-fidelity alerts without drowning analysts ...
5 hours ago Cybersecuritynews.com Hunters
Squid Werewolf Mimic as Recruiters Attacking Job Seekers To Exfiltrate Personal Data - To protect against such threats, security experts recommend implementing email security solutions, avoiding opening attachments from unknown senders, and deploying endpoint detection and response tools capable of identifying suspicious PowerShell ...
3 months ago Cybersecuritynews.com APT37 APT3
AI Outperformed Elite Red Teams in Creating an Effective Spear Phishing Attack - By March 2025, their AI spear phishing agent (codenamed JKR) achieved a 23.8% higher success rate than human red teams across all user skill levels. Prompt Engineering for Task Execution: For novel attacks, JKR uses instructions like:- ...
3 months ago Cybersecuritynews.com
How to Protect Yourself from Job Scams: Essential Tips - The internet is a powerful tool in our career search, but it also provides cyber criminals with information and tactics they can use to exploit and deceive people looking for work. Job scams are sadly prevalent on the web, and if you’re job ...
2 years ago Tripwire.com
The Rise of Cyber Insurance - What CISOs Need to Consider - Cyber insurance offers not just financial protection against potentially devastating cyber incidents but also provides frameworks for improving security posture, access to specialized resources, and support during crisis scenarios. Beyond financial ...
3 months ago Cybersecuritynews.com
What SOCs Need to Know About Water Dybbuk - According to the Federal Bureau of Investigation, BEC costs victims more money than ransomware, with an estimated US$2.4 billion being lost to BEC in the US in 2021. Recently, BEC scammers have been using stolen accounts from legitimate Simple Mail ...
2 years ago Trendmicro.com
Three Key Threats Fueling the Future of Cyber Attacks - Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat landscape is continually evolving. Protecting an organization against intrusion remains a cat and mouse game, in ...
1 year ago Cyberdefensemagazine.com
New Phishing Attack Targeting Job Seekers via WhatsApp Offers - “These attacks are getting more sophisticated – using convincing branding, login portals, and even pressure tactics like ‘equipment purchases’ to extract credentials and cash,” Eshed, Co-Founder and CEO at LayerX Security, ...
2 months ago Cybersecuritynews.com
IT Professionals in ASEAN Confronting Rising Cyber Security Risks - The ASEAN region is seeing more cyber attacks as digitisation advances. In July 2023, the Association of Southeast Asian Nations officially opened a joint cyber security information sharing and research centre, or Cybersecurity and Information Centre ...
1 year ago Techrepublic.com
Kickstart Your DShield Honeypot [Guest Diary] - SANS Internet Storm Center - •    ISC Handlers and Interns: This tool provides a streamlined process for post-installation setup, allowing for faster honeypot deployment and data collection. •    Automated Log Backups: The script ...
9 months ago Isc.sans.edu
Cyber Employment 2024: Sky-High Expectations Fail Businesses & Job Seekers - Well-publicized estimates of a massive shortfall in cybersecurity workers have resulted in high expectations among job seekers in the field, but the reality often falls flat, because of a mismatch between companies' requirements and job seekers' ...
1 year ago Darkreading.com Equation
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
9 months ago Cyberdefensemagazine.com Akira
Combat Phishing Attacks With AI-Powered Threat Protection - According to statistics, 81% of organizations have seen an increase in phishing emails since 2020, with an estimated 3.4 billion emails sent every day. AI-generated phishing emails are a sophisticated and evolving cybersecurity threat. ...
1 year ago Gbhackers.com
Flipping the BEC funnel: Phishing in the age of GenAI - For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic email and fire it out to thousands of recipients in the hope that a few might take the bait. Common among these new techniques was a shift towards ...
1 year ago Helpnetsecurity.com
Trellix Unveils New Phishing Simulator to Proactively Identify & Mitigate Phishing Attacks - The Phishing Simulator serves as a companion to Trellix Email Security – Cloud, offering security administrators a robust toolkit for crafting authentic phishing scenarios, delivering personalized training, and tracking employee progress. ...
2 months ago Cybersecuritynews.com
North Korean APT Hackers Create Companies to Deliver Malware Strains Targeting Job Seekers - A sophisticated North Korean advanced persistent threat (APT) group known as “Contagious Interview” has established elaborate fake cryptocurrency consulting companies to target job seekers with specialized malware. Their investigation ...
2 months ago Cybersecuritynews.com Lazarus Group
Microsoft365 Themed Attack Leveraging OAuth Redirection for Account Takeover  - Threat researchers at @Proofpoint are tracking two ongoing, highly targeted campaigns combining OAuth redirection mechanisms with brand impersonation techniques, malware proliferation and #Microsoft365 themed #credential phishing for #Account ...
4 months ago Cybersecuritynews.com
Uncertainty Is the Biggest Challenge to Australia's Cyber Security Strategy - Political shifts could lead to changes in Australia's cyber security strategy. Early in 2023, as the Australian government started to craft its cyber security vision, it met with opposition at both ends of the political spectrum. On the right wing, ...
1 year ago Techrepublic.com
Why Phishing Remains the #1 Cyber Threat and How to Stop It - Unlike many cyber threats that rely solely on technical vulnerabilities, phishing exploits natural human tendencies such as trust, urgency, and curiosity. Additionally, adopting zero-trust security frameworks, which require continuous verification of ...
2 months ago Cybersecuritynews.com
Cyber Insurance for Businesses: Navigating Coverage - To mitigate these risks, many businesses opt for cyber insurance. With the wide range of policies available, navigating the world of cyber insurance can be overwhelming. In this article, we will delve into the complexities of cyber insurance and ...
1 year ago Securityzap.com
Key Breakthroughs from RSA Conference 2025 - Day 1 - Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, ...
2 months ago Cybersecuritynews.com Inception

Latest Cyber News


Cyber Trends (last 7 days)