Technology ❯Cybersecurity ❯Malware
Data Wipers Spear-Phishing AI-based Attacks Zero-Day Vulnerabilities Online Privacy Data Privacy Scams Data Theft Exploitation Techniques Text Message Scams Mobile Applications Windows Security Social Engineering Fraudulent Apps Credential Theft
CTM360 warns the operation uses AI-generated Meta ads with OAuth hijacking to harvest credentials as it targets crypto assets worldwide