ClickFix phishing page coaching a user to paste a command that steals M365 access

ClickFix Lures Coach Users to Self-Infect and Bypass Filters

ClickFix campaigns scale by coaching users to “fix” access issues with copy-paste commands. After the click, actors steal Microsoft 365 tokens or credentials and, in some cases, drop PureRAT for persistence. Break the flow by enforcing admin-only app consent, requiring phishing-resistant MFA, and blocking browser-to-shell chains. Investigate mailbox rules, token reuse, and OAuth grants whenever ClickFix pages appear in referral logs.

Read More

Drone Sightings Halt Flights in Copenhagen and Oslo, Aviation Security on Alert

Airports in Copenhagen and Oslo faced unexpected disruptions this weekend after drones were spotted near their airspace. With both airports temporarily halting flights, the incidents highlight growing concerns over drone misuse and the potential risks to aviation, national security, and public safety Drone Disruption in Copenhagen Copenhagen Airport, one of Scandinavia’s busiest hubs, suspended air…

Read More