<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>phishing on Security Addict</title><link>https://blog.medarkus.net/tags/phishing/</link><description>Recent content in phishing on Security Addict</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><managingEditor>me@darkus.dev (DeMarcus Williams)</managingEditor><webMaster>me@darkus.dev (DeMarcus Williams)</webMaster><lastBuildDate>Sun, 11 Oct 2020 13:55:23 -0500</lastBuildDate><atom:link href="https://blog.medarkus.net/tags/phishing/index.xml" rel="self" type="application/rss+xml"/><item><title>Xbalti Kit</title><link>https://blog.medarkus.net/posts/xbalti-kit/</link><pubDate>Sun, 11 Oct 2020 13:55:23 -0500</pubDate><author>me@darkus.dev (DeMarcus Williams)</author><guid>https://blog.medarkus.net/posts/xbalti-kit/</guid><description>We&amp;rsquo;re back with something a little different this time. I found myself pretty bored this Sunday so I decided to go searching for some active phishing campaigns. I think it&amp;rsquo;s interesting to look into what tools and techniques are being employed by cyber criminals.
I came across one campaign targeting Amazon users which obviously piqued my interest ;). The kit itself doesn&amp;rsquo;t seem to be new, but new instances are still popping up.</description></item></channel></rss>