logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • The Shifting Landscape of Open Source Supply Chain Attacks – Part 3
  • Chinese PlugX Malware Hidden in Your USB Devices?
  • Ukraine’s Critical Sectors Targeted in Phishing Attack Surge
  • 3 business application security risks businesses need to prepare for in 2023
  • Google slays thousands of fake news vids posted by pro-China group Dragonbridge

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2020-29297 (online_food_ordering_system) 20 January 2023
  • CVE-2020-23256 (electerm) 20 January 2023
  • CVE-2020-21152 (inxedu) 20 January 2023
  • CVE-2021-26644 (mangboard_wp) 20 January 2023
  • CVE-2021-27782 (bigfix_mobile) 20 January 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Open Redirect Flaws Abused in LogoKit Campaigns

Posted on 12 August 2022

From cyware.com

Open Redirect Flaws Abused in LogoKit Campaigns

Cybercriminals are taking advantage of open redirect flaws in online services and apps to bait unsuspecting users through phishing. The aim behind the abuse of these flaws is to bypass spam filters and harvest credentials.

Read more…

Posted in News

Post navigation

Previous post: Data Safety instead of App Permissions
Next post: Ransomware attack blamed for closure of all 7-Eleven stores in Denmark
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.