Intel Chain
The BBC has been able to obtain testimony from parents and those trying to help children deal with the distress that comes with war. Source: BBC News
Evidence Chain (1 linked intel)
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the target and the legitimate site -- forwarding the victim's username, password and multi-factor authentication (MFA) code to the legitimate site and returning its responses. Source: Krebs on Security
Stolen credentials turn authentication systems into the attack surface. Token shows how wearable biometric authentication verifies the user—not the session—blocking phishing relays and MFA bypass. [...] Source: BleepingComputer
Have related intel?
Corroborate, contradict, or expand this intelligence chain.