Cybercriminals are leveraging DocuSign’s APIs to send realistic phishing invoices that evade spam filters by appearing to originate from legitimate DocuSign accounts. This technique allows attackers to target users with fake invoices from trusted platforms like Norton, increasing the risk of deception. Security researchers at Wallarm warn that this method capitalizes on the credibility of DocuSign to bypass detection.
Read MoreHackers allege they accessed Nokia’s internal systems through a third-party contractor, stealing sensitive data, including SSH keys and source code. The data is reportedly listed for $20,000 on BreachForums, with the hacker insisting that no customer information was compromised. Nokia has yet to address these claims.
Read More