Get the latest tech news
None
Get the Android app
Read more on:
phishing
trusted domains
threat vectors
Related news:
Hazy Hawk gang exploits DNS misconfigs to hijack trusted domains
Phishing-as-a-service operation uses DNS-over-HTTPS for evasion
EvilProxy uses indeed.com open redirect for Microsoft 365 phishing