A sophisticated phishing campaign, led by the Tycoon2FA and Storm-1575 groups, threatens Office 365 users globally. This collaboration utilizes advanced techniques like adversary-in-the-middle (AiTM) to bypass multi-factor authentication. Targeting victims with social engineering tactics, it employs a complex phishing infrastructure to steal credentials and session data, maintaining persistent access and evading detection.

Cybercriminals harness AI to boost phishing & malware attacks
Artificial Intelligence (AI) tools are increasingly being used by small cybercriminal groups to develop more persistent malware, trick users into downloading malicious payloads, and create