logo
  • About
  • Contact
  • Hall of fame

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Google Confirms 75 Zero-Day Attacks: Phones And Browsers Were Targeted
  • Mitre warns over lapse in CVE coverage
  • Over 200 Million Records Allegedly Belonging to X Leaked Online
  • Catastrophic hack of AT&T and Verizon is proof Apple is right about iPhone encryption
  • Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackers

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Open Redirect Flaws Abused in LogoKit Campaigns

Posted on 12 August 2022

From cyware.com

Open Redirect Flaws Abused in LogoKit Campaigns

Cybercriminals are taking advantage of open redirect flaws in online services and apps to bait unsuspecting users through phishing. The aim behind the abuse of these flaws is to bypass spam filters and harvest credentials.

Read more…

Posted in News

Post navigation

Previous post: Data Safety instead of App Permissions
Next post: Ransomware attack blamed for closure of all 7-Eleven stores in Denmark
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.