A large-scale phishing campaign is targeting users of Meta Business Suite (MBS), leveraging legitimate Meta infrastructure to harvest login credentials across thousands of small- and medium-sized businesses worldwide. The attack bypasses typical email-security filters by exploiting native business-invitation functionality rather than using obviously spoofed domains. Researchers at Check Point Research observed around 40,000 phishing emails sent to over 5,000 customers across multiple sectors (automotive, education, real-estate, hospitality, finance) in the U.S., Europe, Canada and Australia. The attackers set up bogus Facebook Business pages displaying Meta branding, then used the business-invitation feature within MBS to send invites from the legitimate domainfacebookmail.com, making the messages appear trustworthy. Recipients clicking the invitation link were redirected to credential-harvesting pages hosted on domains such as vercel.app. Because the messages came from a legitimate Meta domain and used genuine business-tool features, conventional sender-domain checks and phishing filters were largely bypassed. Users were urged via language like “Action Required”, “You’re Invited to Join the Free Advertising Credit Program”, or “Account Verification Required” to click links.
Apple has revealed that it blocked more than $11 billion in fraudulent App Store transactions over the past six years, including over $2.2 billion in potentially fraudulent activit...
Trend Micro has disclosed an actively exploited zero-day vulnerability affecting its Apex One endpoint security platform used in enterprise Windows environments. The flaw, tracked ...
Drupal has warned administrators that threat actors are actively attempting to exploit a highly critical SQL injection vulnerability tracked as CVE-2026-9082. The flaw impacts Drup...