Skip to main content
PPPhishPondOffensive and Defensive Phishing Intelligence Journal

Offense + Defense

NewsThreat TrendsCampaign AnalysisRadarTooling & DetectionResearchAboutSubscribe
NewsThreat TrendsCampaign AnalysisRadarTooling & DetectionResearchAboutSubscribe

Editorial Desk

PhishPond

Editorial cybersecurity publication focused on phishing campaign intelligence, detection, mitigation, and identity defense operations.

Built for defenders who need context, not recycled scare copy.

Navigate

  • Home
  • News
  • Research
  • Subscribe

Signals

  • editorial@phishpond.dev
  • Mission & Editorial Policy
  • Weekly Brief
  • Submit Research Tip
© 2026 PhishPond. Defensive research use only.

Issue DeskLatest update May 6, 202633 live stories

Independent Editorial Desk

Red Team · Blue Team · Dual-Use Research

Phishing intelligence for teams that need signal, not recycled noise.

PhishPond tracks campaign evolution, adversary tradecraft, detection engineering patterns, and practical mitigation lessons across email, identity, and browser-centric attack surfaces.

Desk Brief

This week in the pond

  • 8featured investigations
  • 13research notes in the archive
  • 6coverage streams for security teams

Built as a working editorial publication with fast scans for news, project radar, trend watching, and deeper operational context.

Red Team Lens

Attack Patterns

Campaign tradecraft, lure mechanics, infrastructure abuse, identity pressure, and adversary workflows worth modeling.

12 red-team reads

Blue Team Lens

Defense Patterns

Detection engineering, user reporting, authentication controls, and response playbooks security teams can operationalize.

21 blue-team reads

GitHub Trends

Project Radar

20 live
  • Dual-use project0xDanielLopez/phishing_kitsRepo · 267 stars
  • Dual-use projectphishdestroy/destroylistHTML · 999 stars
  • Dual-use project0xDanielLopez/TweetFeedRepo · 655 stars

New Today

Fresh intel since the last refresh

0 new articles, 2 new projects

Projects

  • Blue team toolurldna/mcp

    Python7 stars

  • Dual-use projectsharsil/favicorn

    Python192 stars

Blue TeamDefense Pattern

Lead Story

Blue TeamFeaturedThreat TrendsMay 6, 2026

Unmanaged OAuth Grants Are the SaaS Back Door Hiding in Plain Sight

The phishing lesson is that attackers do not always need a fresh credential when a trusted app token already has delegated access.

Persistent OAuth grants let third-party apps keep operating after the original login, password reset, or employee lifecycle event has faded from view.

Read more:The Hacker NewsMicrosoft Learn

By PhishPond Desk · 8 min read

Now Reading

Latest Stories

  • Compliance Lures Are Becoming Multi-Stage AiTM Token Traps
  • Detect OAuth Abuse by Watching What Apps Do After Consent
  • OAuth Consent Governance Needs a Front Door and a Cleanup Crew
  • Research Note: Octo Tempest and Scattered Spider Show Why Help Desk Identity Is Attack Surface
  • RMM Phishing Turns the Click Into Remote Access
  • The Drift Token Lesson Is SaaS Blast Radius, Not Just Vendor Risk

Live Collection

Outside Intel Watch

Articles & Analysis

5 tracked
  • Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads

    The Hacker NewsMay 8, 2026News

    Finance workflows remain exposed when trust signals come from compromised inboxes.

    Read more:The Hacker News

  • Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

    The Hacker NewsMay 8, 2026News

    Trusted suppliers and developer channels can carry phishing risk past normal filters.

    Read more:The Hacker News

  • New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials

    The Hacker NewsMay 8, 2026News

    Identity and session abuse can turn a single successful lure into account takeover.

    Read more:The Hacker News

  • When prompts become shells: RCE vulnerabilities in AI agent frameworks

    Microsoft Security BlogMay 7, 2026Vendor Research

    Mailbox and payment workflow abuse creates business risk without malware.

    Read more:Microsoft Security Blog

  • New PCPJack worm steals credentials, cleans TeamPCP infections

    BleepingComputerMay 7, 2026News

    Identity and session abuse can turn a single successful lure into account takeover.

    Read more:BleepingComputer

GitHub Project Radar

5 tracked
  • Dual-use project0xDanielLopez/phishing_kits

    267 starspushed May 10, 2026

    Exposing phishing kits seen from phishunt.io 267 stars.

    Open project:GitHub

    #malware#osint#phishing#phishing-attacks

  • Dual-use projectphishdestroy/destroylist

    HTML999 starspushed May 10, 2026

    Real-time phishing & scam domain blocklist — 130k+ curated threats, 888K+ community, free API, multiple formats Primary language: HTML. 999 stars.

    Open project:GitHub

    #anti-phishing#blacklist#blocklist#crypto-scam

  • Dual-use project0xDanielLopez/TweetFeed

    655 starspushed May 10, 2026

    TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes. 655 stars.

    Open project:GitHub

    #blueteam#malware#malware-detection#malware-research

  • Blue team toolromainmarcoux/malicious-domains

    DIGITAL Command Language96 starspushed May 10, 2026

    Aggregation of lists of malicious domains (phishing) that can be integrated into FortiGate firewalls and other products. Primary language: DIGITAL Command Language. 96 stars.

    Open project:GitHub

    #blocklist#blocklists#domains-blacklist#domains-list

  • Blue team toolromainmarcoux/malicious-outgoing-ip

    26 starspushed May 10, 2026

    Aggregation of lists of malicious IP addresses (C2, malware, phishing), to be blocked in the LAN > WAN direction, integrated into firewalls: FortiGate, Palo Alto, pfSense, IPtables 26 stars.

    Open project:GitHub

    #blocklist#blocklists#c2#firewall

Reader Map

Choose the signal you need

News

Fast-turn reporting from tracked security sources.

Threat Trends

Editorial coverage for threat trends workflows.

Campaign Analysis

Editorial coverage for campaign analysis workflows.

Email Security

Editorial coverage for email security workflows.

Tooling & Detection

Editorial coverage for tooling & detection workflows.

Research

Longer analysis tied to practical defender outcomes.

Search Tool

Search Intelligence

Search article titles, authors, tags, and body text across the PhishPond archive.

Showing 1 matching story.Clear search

Search Results for "API Security"

Field Analysis

Blue TeamTooling & DetectionMay 6, 20268 min read

Detect OAuth Abuse by Watching What Apps Do After Consent

A static permission review cannot catch a trusted integration whose token is later stolen or whose behavior changes.

Read more:The Hacker NewsMicrosoft Learn

By PhishPond Desk

  • #OAuth
  • #Detection Engineering
  • #API Security

Radar Shortcuts

  • All GitHub radar projects
  • Red team reads
  • Blue team reads

Trending Topics

  • #BEC
  • #Session Hijacking
  • #QR Phishing
  • #Mailbox Rules
  • #Detection Engineering

Latest News

  • Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads

    The Hacker NewsMay 8, 2026

  • Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

    The Hacker NewsMay 8, 2026

  • New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials

    The Hacker NewsMay 8, 2026

  • When prompts become shells: RCE vulnerabilities in AI agent frameworks

    Microsoft Security BlogMay 7, 2026

Editorial Signals

  • Every article includes a defender takeaway.
  • Source links are surfaced with each story.
  • Red-team framing avoids operational abuse guidance.

Subscribe to the Weekly PhishPond Brief

Get campaign breakdowns, threat trend signals, and defender-focused mitigations in one concise publication.

No spam. Unsubscribe anytime. Subscriber details are used only for this publication.