Xcitium Logo
  • Blogs
  • Malware Library

Phishing

Phishing

  • How ShinyHunters Use Vishing to Breach Enterprise SSO and Steal Cloud Data

    February 2, 2026
  • Unmasking Sneaky 2FA: How Modern Phishing Kits Bypass MFA in 2026

    January 28, 2026
  • Tycoon 2FA Phishing Kit: The Sophisticated Threat Bypassing Modern Security

    January 27, 2026
  • One Phishing Mail Is Enough: How Dropper Malware Delivers Trojan Attacks

    January 22, 2026
  • Scan at Your Own Risk: How Quishing Turns QR Codes Into Phishing Weapons

    December 29, 2025

Categories

Phishing
Ransomware
AI Architecture
Threat Intelligence
Data Protection
Endpoint Security
  • Phishing
    • How ShinyHunters Use Vishing to Breach Enterprise SSO and Steal Cloud Data
    • Unmasking Sneaky 2FA: How Modern Phishing Kits Bypass MFA in 2026
    • Tycoon 2FA Phishing Kit: The Sophisticated Threat Bypassing Modern Security
    • One Phishing Mail Is Enough: How Dropper Malware Delivers Trojan Attacks
    • Scan at Your Own Risk: How Quishing Turns QR Codes Into Phishing Weapons
  • Categories
xcitium
Address
200 Broadacres Drive, Bloomfield, NJ 07003
  • Sales (US): +1 (973) 859-4000
  • Sales (Int): +1 (888) 551-1531
  • Support: +1 (973) 396-1232
  • Fax: +1 (973) 777-4394
Email
  • Inquire: sales@xcitium.com
  • Support: support@xcitium.com
  • Report Bugs: security@xcitium.com
Legacy
  • Website Terms & Conditions
  • Privacy
  • Legal Repository
  • Cookie Policy
  • Platform Terms
  • Cybersecurity Glossary
  • Editorial Guidelines
Socials

Copyright © 2026 Xcitium All Rights Reserved.

Note: that EDR and MDR are industry related terms, trademarked accordingly. Xcitium does not own them in any way and uses them for educational purposes only