Skip to content
  •   Friday, May 9, 2025
  • Time Clock
  • Online Coursework
  • IT Tools
  • CTF
  • STEAM
  • CCR
  • Tech News
  • ■█■
    • SHA Research
  • Activities
    • SkillsUSA IT
    • GBT Cyber Team
    • Cyber Security Teams
    • ACTE Tech Fairs
    • Misc Tech Competitions
    • Rocketry
  • Cyber Attack Maps
    • Sonic Wall Security Center
    • Fortinet Threat Map
    • FireEye Threat Map
    • ThreatCloud Map
    • SpamHaus Botnet Threats
    • BitDefender RealTime Map
    • LookingGlass Threat Map
    • TALOS Attack Map
    • NetScout Threat Report
    • Kaspersky Cyber Threat Map
    • ThreatButt Map
    • SOPHOS Threat Tracker
    • DDOS Attack Map

BK's Infosec Classes

LHS IT and Cyber Classes

Banner Add
Latest Posts
1.7 billion passwords leaked on dark web and why yours is at risk | Fox News
CoGUI phishing platform sent 580 million emails to steal credentials
FBI shares massive list of 42,000 LabHost phishing domains
GoSearch: Open-source OSINT tool for uncovering digital footprints – Help Net Security
Why I’m Learning to Code in the Age of Vibe Coding
FBI: US lost record $16.6 billion to cybercrime in 2024
Hackers using malware to steal data from USB flash drives | Fox News
Years-old login credential leads to leak of 270,000 Samsung customer records | CSO Online
23andMe is potentially selling more than just genetic data – the personal survey info it collected is just as much a privacy problem
As 23andMe goes bankrupt, millions of people’s DNA data is up for sale
Police remove skimmer from Piggly-Wiggly on Battle Street | News | annistonstar.com
15 Useless Linux Commands Everyone Needs to Know
What Are Virtual Machines, and How Do They Work?
Online scams easy as ever, as cybercrime markets flourish
Apartment buildings broken into with phone in minutes — IoT-connected intercoms using default creds vulnerable to anyone with Google | Tom’s Hardware
Misconfig Mapper: Open-source tool to uncover security misconfigurations – Help Net Security
OSINT Framework
US Coast Guard paychecks delayed by cyberattack | TechRadar
Teaching Middle School about CTF Competitions
Open Source Intelligence Tools with Geoguessing
3rd Place at the National Cyber Summit
Helping SR Citizens Avoid Scams
Touring the UAB Digital Forensics Labs
Cyber Students Featured on TV
Competing at the 2024 National Cyber Summit
  • Home
  • 2025
  • April
  • 30
  • FBI shares massive list of 42,000 LabHost phishing domains
Cyber Crime Defense InfoSec News Security Tech News Tech Resources Vulnerabilities

FBI shares massive list of 42,000 LabHost phishing domains

1 week ago
bk
No Comments

This is a big deal in the ongoing fight against phishing attacks.

https://www.bleepingcomputer.com/news/security/fbi-shares-massive-list-of-42-000-labhost-phishing-domains/

Tags: #domains, #phishing

Post navigation

GoSearch: Open-source OSINT tool for uncovering digital footprints – Help Net Security
CoGUI phishing platform sent 580 million emails to steal credentials

Leave a Reply Cancel reply

You must be logged in to post a comment.

Recent Posts

Cyber Crime InfoSec News Privacy Security Vulnerabilities

1.7 billion passwords leaked on dark web and why yours is at risk | Fox News

A new report shows just how out of control the problem has become, with infostealer activity jumping 500% in just one year, harvesting more than 1.7 billion fresh credentials.

Cyber Crime InfoSec News Lessons Malware Vulnerabilities

CoGUI phishing platform sent 580 million emails to steal credentials

Cyber Crime Defense InfoSec News Security Tech News Tech Resources Vulnerabilities

FBI shares massive list of 42,000 LabHost phishing domains

Competitions CTF Cyber Practice InfoSec News Tech Resources

GoSearch: Open-source OSINT tool for uncovering digital footprints – Help Net Security

Programming Software Tech News

Why I’m Learning to Code in the Age of Vibe Coding

Cyber Crime InfoSec News Safety Vulnerabilities

FBI: US lost record $16.6 billion to cybercrime in 2024

Cyber Crime Defense InfoSec News Malware Security Vulnerabilities

Hackers using malware to steal data from USB flash drives | Fox News

Competitions Cyber Crime CyberPatriot InfoSec News Lessons Security Vulnerabilities

Years-old login credential leads to leak of 270,000 Samsung customer records | CSO Online

InfoSec News Laws Lessons Privacy Safety Tech News Vulnerabilities

23andMe is potentially selling more than just genetic data – the personal survey info it collected is just as much a privacy problem

InfoSec News Lessons Privacy Safety Tech News Vulnerabilities

As 23andMe goes bankrupt, millions of people’s DNA data is up for sale

Cyber Crime InfoSec News Safety Vulnerabilities

Police remove skimmer from Piggly-Wiggly on Battle Street | News | annistonstar.com

Lessons Linux Operating Systems

15 Useless Linux Commands Everyone Needs to Know

Careers CTF CyberPatriot InfoSec News Lessons Operating Systems Tech Resources

What Are Virtual Machines, and How Do They Work?

Cyber Crime InfoSec News Malware Security Vulnerabilities

Online scams easy as ever, as cybercrime markets flourish

Cyber Crime InfoSec News Security Vulnerabilities

Apartment buildings broken into with phone in minutes — IoT-connected intercoms using default creds vulnerable to anyone with Google | Tom’s Hardware

Competitions CTF Cyber Practice CyberPatriot InfoSec News Security Tech Resources Vulnerabilities

Misconfig Mapper: Open-source tool to uncover security misconfigurations – Help Net Security

Competitions CTF Cyber Practice InfoSec News Lessons Security SG Tools Tech Resources

OSINT Framework

Cyber Crime Defense InfoSec News Lessons Tech News

US Coast Guard paychecks delayed by cyberattack | TechRadar

Slider

Teaching Middle School about CTF Competitions

Slider

Open Source Intelligence Tools with Geoguessing

Class News

Golden Bears Cyber Patriot 17 Schedule

9 months ago
bk

Here is the 2024-2025 CyberPatriot 17 Schedule. Some Dates / Times might be changeable based on the CyberPatriot Competition Windows and Advisor’s Availability.

LAPD warns residents after spike in burglaries using Wi-Fi jammers that disable security cameras, smart doorbells | Tom’s Hardware

10 months ago
bk

TCBOE Breakfast and Lunches Will Be Free for  2024-2025

10 months ago
bk

Job scams surged 118% in 2023 due to AI, watchdog group warns | Fox Business

10 months ago
bk

Free Self-Paced Courses from the Cisco Networking Academy

10 months ago
bk

Planning in Chess and Cybersecurity | Premier Chess

10 months ago
bk

The FIA has been hacked after workers fell for a phishing attack | TechRadar

10 months ago
bk

Extracurriculars Matter To You and To Colleges – BigFuture

10 months ago
bk

Simplilearn: 41 Highest Paying Tech Jobs | Best Paying Jobs in Technology

10 months ago
bk

11 Must-Do Security Steps Before Heading Out on Your Next Vacation – CNET

11 months ago
bk

12 hottest IT security certs for higher pay today | CSO Online

11 months ago
bk

IT and Cyber Class Supply List for 2024-2025

11 months ago
bk

First Day of School for 2024-2025

11 months ago
bk

UAH – News: Nursing students Using Drones to Simulate Treating Patients After a Disaster

11 months ago
bk

Disgruntled ex-employee costs company over $600,000 after he deletes all 180 of its test servers — found server deletion scripts on Google | Tom’s Hardware

11 months ago
bk

Drone Racing – Are you looking for something new and different to do for extra-curricular activities?

11 months ago
bk

ITPro: 15 top BBC micro:bit projects

11 months ago
bk

The 2024 Alabama SkillsUSA State Champions in Web Design

11 months ago
bk

Preparing for a career in cybersecurity? Check out these statistics – Help Net Security

11 months ago
bk

Esports in Education: Fostering Student Success – Intel

11 months ago
bk

Career News

What Are Virtual Machines, and How Do They Work?

2 months ago
bk

A virtual machine (VM) is a software-based emulation of a computer. A program called a hypervisor runs on your computer. It allows you to create virtual machines–virtual computers—and configure them with an amount of RAM, hard drive space, CPU cores, and other details that would normally be provisioned in hardware. Once you’ve configured your VM, you can turn it on and install an operating system.

HYPR is latest firm to reveal hiring of fraudulent IT worker overseas | CyberScoop

6 months ago
bk

How to build an effective DevSecOps team | SC Media

10 months ago
bk

Cybersecurity jobs available right now: July 17, 2024 – Help Net Security

10 months ago
bk

How Much Does a Pen Test Cost?

10 months ago
bk

How to Become a Network Administrator: Key Steps Explained

10 months ago
bk

Job scams surged 118% in 2023 due to AI, watchdog group warns | Fox Business

10 months ago
bk

Free Self-Paced Courses from the Cisco Networking Academy

10 months ago
bk

Navy tests using drones for medical supply deliveries during RIMPAC

10 months ago
bk

7-Step Plan to Succeed in Chess in 2024

10 months ago
bk

Army testing ‘pocket-sized’ drones that could soon be in the hands of every squad | Fox News

10 months ago
bk

Planning in Chess and Cybersecurity | Premier Chess

10 months ago
bk

To guard against cyberattacks in space, researchers ask “what if?” | Ars Technica

10 months ago
bk

Space Force Adds Two New Launch Providers

10 months ago
bk

The FIA has been hacked after workers fell for a phishing attack | TechRadar

10 months ago
bk

How to Become a Network Administrator: Key Steps Explained

10 months ago
bk

Cybersecurity jobs available right now: July 3, 2024 – Help Net Security

10 months ago
bk

Hiring expert: The resume mistake that will land it in the ‘no pile’

10 months ago
bk

Time management for Gen Z entering the workforce – Fast Company

10 months ago
bk

Simplilearn: 41 Highest Paying Tech Jobs | Best Paying Jobs in Technology

10 months ago
bk
Click Here for Archives Page for Blog Posts
April 2025
S M T W T F S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar   May »

#ai #attacks #careers #commandline #communications #computers #crime #ctf #cyberattacks #cybercrime #cyberpatriot #cybersecurity #cyberwarfare #drones #employability #engineering #fraud #gaming #hackers #hardware #healthcare #history #information #jobs #linux #malware #network #os #pentesting #phishing #pico2019 #pico2021 #podcast #privacy #programming #ransomware #safety #scammers #scams #security #software #terminal #threats #vulnerability #windows

Copyright 2024 ©bk All rights reserved | Theme by MantraBrain