A newly discovered PayPal Holdings Inc. credential phishing attempt targets customers by using legitimate services and bypassing Google LLC Workspace security measures. The assault, which was detailed by Bryan O’Neil, Vice President of Solutions Engineering at email security firm Armorblox Inc., uses vulnerabilities with PayPal connectivity with GoDaddy Inc. and Glitch in its phishing sequence.
Social engineering, brand impersonation, the usage of security themes, duplication of existing procedures, and probing legitimate infrastructure are some of the strategies used in phishing email assaults to get past typical email security protections. GoDaddy hosts the email sender domain, while Glitch Editor is used to designing the phishing page.
To Read More: SiliconAngle
Also Check : Introducing the TOUGHBOOK S1 Developed to deliver all the features you want, and all the rugged you need