Listen

Description

Identifying a Phisher

https://isc.sans.edu/forums/diary/Identifying+a+phisher/24164/

Phishing via Azure Blob Storage

https://www.netskope.com/blog/phishing-in-the-public-cloud

Zoho Domains Used for Phishing and Keyloggers

https://cofense.com/staggering-amount-stolen-data-heading-zoho-domains/

Dell iDRAC Exploit

https://www.servethehome.com/idracula-vulnerability-impacts-millions-of-legacy-dell-emc-servers/