Pablo Torre still hasn’t forgotten Barcelona. The Mallorca midfielder, who left Barça last summer, has had a difficult season at his new club where he struggled for regular playing time. But he’s s...
Pablo Torre still hasn’t forgotten Barcelona. The Mallorca midfielder, who left Barça last summer, has had a difficult season at his new club where he struggled for regular playing time. But he’s starting to find his form after a change of coaches, with Martín Demichelis trusting Torre and giving him more minutes in recent weeks. […]
Netflix is expanding its preschool and kids’ series, films and games lineup with new preschool series Young MacDonald, renewals for Trash Track and The Creature Cases, and release dates for Sesame ...
Netflix is expanding its preschool and kids’ series, films and games lineup with new preschool series Young MacDonald, renewals for Trash Track and The Creature Cases, and release dates for Sesame Street, CoComelon Lane and Gabby’s Dollhouse: The Movie, among others. Additionally, Netflix is launching Playground, a new app where kids can play games and […]
TL;DR This week's Attack of the Day posts revealed a clear pattern: attackers are deliberately routing attacks through legitimate security and platform infrastructure so the tools themsel...
TL;DR This week's Attack of the Day posts revealed a clear pattern: attackers are deliberately routing attacks through legitimate security and platform infrastructure so the tools themselves become trust signals. TitanHQ and Cisco URL wrappers hid a malware payload. Microsoft Safe Links rewrote a phishing URL to look protected. Microsoft Bookings sent a phishing email that passed every authentication check. A Google Calendar invite delivered a vishing attack with no scannable payload at all. And a BEC targeting a public utility passed SPF and DMARC while DKIM body-hash verification quietly failed, a signal most gateways ignore. The common thread: authentication confirms origin, not intent, and legitimate infrastructure is the new attack surface.
Severity: High
Phishing
Vishing
Bec
Credential Harvesting
Every week, we publish real phishing attacks caught by IRONSCALES in our Threat Intelligence series. Not simulations. Not theoretical scenarios. Actual incidents from real inboxes, with full technical breakdowns of what happened, why the attack worked (or nearly worked), and what defenders should watch for.
This is the second weekly roundup. It covers five attacks published the week of March 29 through April 3, 2026.
The first thing that jumped out: these five cases don't just share a threat category. They share an operating principle. In every case, the attacker deliberately leveraged legitimate infrastructure or security tooling as part of the attack chain.
Not to bypass the tools. To use them.
5 Attacks. A Few Patterns Worth Watching.
Three of this week's five attacks involved security or platform infrastructure being turned into camouflage. Not bypassed. Used.
In The Security Tools That Became the Camouflage, attackers routed a malware payload through two layers of legitimate vendor URL wrapping: TitanHQ link-lock and a Cisco secure-web redirect. URL scanners evaluating the link saw vendor domains at every hop and stopped looking. The actual destination, a .in domain with a broken TLS certificate flagged as malware, was invisible behind the outermost wrapper.
In When the Safety Wrapper Becomes the Disguise, Microsoft Safe Links rewrote a phishing URL on delivery, replacing a suspicious is.gd shortener with a Microsoft-branded safelinks.protection.outlook.com wrapper. The security feature designed to protect the recipient became the visual proof that the link was "safe."
And in Microsoft Bookings as a Weapon, attackers sent phishing through the actual Microsoft Bookings platform. SPF passed. DKIM passed. DMARC passed. The only signal that something was wrong was an ARC chain failure at hop 2, a header most security tools never check.
When the scanner evaluates a link and sees a known-good vendor domain, it has been taught (by the attacker) to stop looking.
Every attack this week passed at least some authentication checks. All five achieved SPF or DKIM pass. Four out of five passed DMARC. The exception was the most technically revealing case of the group. In SPF Passed. DMARC Passed. DKIM Didn't., a BEC email requesting ACH routing details and a signed W-9 passed SPF and DMARC but failed DKIM body-hash verification. That specific failure means the message body was modified after the original sender signed it. The relay chain ran through Proofpoint and Barracuda before hitting Microsoft Exchange. Somewhere in transit, the content changed. Most email security stacks treat "DMARC pass" as a green light. This case shows why that shortcut is dangerous: DMARC passed on the strength of SPF alone, while the one check that actually validates body integrity (DKIM body-hash) was screaming that something was wrong.
And then there was the attack with no technical payload at all. No malicious URL, no attachment, no credential harvest page, no malware.
The entire payload was a phone number.
Featured Attack: The Payload Was a Phone Number
A Google Calendar invite arrived on a Tuesday afternoon at a mid-size technology company. Subject line referenced a transaction. RSVP buttons. Google logo at the top. Below the invitation metadata: a billing notice for "CoreDefense Plus," $399.77 charged. "If you didn't make this purchase... call our customer care representative (808)-321-8085 (Toll Free)."
The links in the email pointed to calendar.google.com. They scanned clean, because they were clean. The .ics attachment contained no executable code, no embedded URLs, no alarm actions. Attachment sandboxes returned a clean verdict.
DKIM passed, because Google signed the message from its own infrastructure. The domain, scoolsd[.]com, was registered the same morning the email was sent. No SPF record. No reputation. No history. But that didn't matter to the URL scanners, because there were no URLs to scan.
This is callback phishing, also known as Telephone-Oriented Attack Delivery (TOAD). The FBI's 2024 Internet Crime Report puts BEC and related fraud at over $2.9 billion in U.S. losses, with phone-based social engineering a significant and undercounted contributor. The model is simple: create financial urgency, provide a phone number, and wait for the victim to call. On the other end is a live operator ready to extract credentials, payment details, or remote access.
The attack is specifically engineered to be invisible to every automated control in a standard email security stack. URL reputation checks had nothing to evaluate. Sandbox detonation found a clean .ics file. DKIM returned pass. The charge amount ($399.77) is high enough to trigger urgency but plausible enough for a software renewal. The fake product name mimics legitimate antivirus software. The toll-free number is cost-free to operate at scale.
Themis flagged this incident based on the combination of the freshly-registered domain, the absence of any SPF policy, behavioral patterns in the invite content consistent with financial-urgency social engineering, and community-level intelligence from similar vishing campaigns across the IRONSCALES platform.
Zero-link vishing doesn't fail against well-tuned URL filtering or mature sandboxing. It doesn't need to. It bypasses those controls by design.
See Your Risk: Find out how many threats like this your current security stack is missing
What Defenders Should Take From This Week
The five attacks we published this week are different in their mechanics but identical in their thesis: the tools and platforms your organization trusts are the attack surface.
A few concrete takeaways:
Evaluate redirect chains at depth. Any scanner that stops at the first hop will miss chains routed through vendor wrappers. Follow the full chain to the final destination.
Treat DKIM body-hash failures on financial emails as critical. DMARC pass is not sufficient when someone is asking for ACH details and a W-9. If the body hash failed, the content cannot be trusted.
Train for callback phishing. URL filtering and sandboxing are irrelevant when the payload is a phone number in a calendar invite. Finance teams need specific training on TOAD scenarios.
Stop treating authentication pass as a trust signal. Authentication confirms origin, not intent. A perfectly authenticated email from Microsoft Bookings can still be phishing. Build detection logic that accounts for this.
See You Next Friday
Attack of the Day publishes daily in our Threat Intelligence section. Next week: more attacks, more trends, more reasons to question whether your current stack is seeing what it needs to see.
Email Attack of the Day is a daily series from
IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.
The post Best of the Worst: The Week Your Security Tools Became the Disguise appeared first on Security Boulevard.
security awareness
security bloggers network
ai
attack of the day
credential theft
email securi
We know what the next Racing Miku design for Hatsune Miku looks like, as Good Smile Company shared the Kyojo Vita 2026 art on social media. Only an initial image of the Vocaloid is available. The...
We know what the next Racing Miku design for Hatsune Miku looks like, as Good Smile Company shared the Kyojo Vita 2026 art on social media. Only an initial image of the Vocaloid is available. The announcement also confirmed that artist Toridamono ended up tasked with the creation of the character’s new look again. This appears ahead of the 2026 Kyojo Cup season, which starts in May 2026.
This Racing Miku Kyojo Vita 2026 image will be used as the basis for race car livery, figures, and other types of Hatsune Miku merchandise. As usual, the character is in a racing-style outfit, with this time it being a dress with long black leggings and high heels. It has the Good Smile Racing logo on both the front of the dress and flag, with her tights showing Crypton’s logo. The two mascots are a pair of birds that are the same color as her hair.
Note that this is a specialized version of the character. As noted on the official website that keeps track of the designs, there are ones for standard races, Kyojo, and Spa. Toridamono, who also did designs for Atelier Ryza and other notable characters, worked on Racing Miku art before. The Kyojo Vita 2025 one and 2024 style are examples of the artist’s work. The art for 2023 that Toridamono did channeled Atelier character sorts of inspirations with the cape and beret.
The Toridamono Racing Miku Kyojo Vita 2026 will be used by Good Smile Company for the 2026 Kyojo Cup season between May 2026 and November 2026.
We may earn a commission if you purchase from certain links. Learn more here.
The post Good Smile Company Racing Miku Kyojo Vita 2026 Design Teased appeared first on Siliconera.
Darth Maul's own series instantly sets itself apart from its relatives with a killer pitch, but it suffers from familiar debut season frustrations.
...
Darth Maul's own series instantly sets itself apart from its relatives with a killer pitch, but it suffers from familiar debut season frustrations.
Fabrizio Romano has placed a timeline on when Bernardo Silva is expected to select his next destination after confirmation of his impending Manchester City exit. After the FA Cup win over Liverpool...
Fabrizio Romano has placed a timeline on when Bernardo Silva is expected to select his next destination after confirmation of his impending Manchester City exit. After the FA Cup win over Liverpool on Saturday, Manchester City assistant coach Pepin Lijnders confirmed Silva’s departure this summer. Lijnders also clarified how the player only has six weeks […]
bernardo silva
manchester city
new club
players
assistants
pepijn lijnders
exit
When you look at MMA stars that have emerged in recent years, Ilia Topuria’s name stands out. Topuria, who recently announced a luxury watch brand partnership, has quickly become one of the best fi...
When you look at MMA stars that have emerged in recent years, Ilia Topuria’s name stands out. Topuria, who recently announced a luxury watch brand partnership, has quickly become one of the best fighters and biggest names in the sport.
West Ham United winger Adama Traore must be closer to seeing his contract extended beyond this summer after his strong performance in the FA Cup...
The post West Ham United: Nuno Espirito Santo mus...
West Ham United winger Adama Traore must be closer to seeing his contract extended beyond this summer after his strong performance in the FA Cup...
The post West Ham United: Nuno Espirito Santo must be considering Adama Traore action after Leeds showing appeared first on Football Insider.
comment
premier league
west ham united
west ham united finance hub
adama traore
nuno espirito santo