Skip to main content
PPPhishPondOffensive and Defensive Phishing Intelligence Journal

Offense + Defense

NewsThreat TrendsCampaign AnalysisRadarTooling & DetectionResearchAboutSubscribe
NewsThreat TrendsCampaign AnalysisRadarTooling & DetectionResearchAboutSubscribe

Editorial Desk

PhishPond

Editorial cybersecurity publication focused on phishing campaign intelligence, detection, mitigation, and identity defense operations.

Built for defenders who need context, not recycled scare copy.

Navigate

  • Home
  • News
  • Research
  • Subscribe

Signals

  • editorial@phishpond.dev
  • Mission & Editorial Policy
  • Weekly Brief
  • Submit Research Tip
© 2026 PhishPond. Defensive research use only.

Issue DeskLatest update May 6, 202633 live stories

Independent Editorial Desk

Red Team · Blue Team · Dual-Use Research

Phishing intelligence for teams that need signal, not recycled noise.

PhishPond tracks campaign evolution, adversary tradecraft, detection engineering patterns, and practical mitigation lessons across email, identity, and browser-centric attack surfaces.

Desk Brief

This week in the pond

  • 8featured investigations
  • 13research notes in the archive
  • 6coverage streams for security teams

Built as a working editorial publication with fast scans for news, project radar, trend watching, and deeper operational context.

Red Team Lens

Attack Patterns

Campaign tradecraft, lure mechanics, infrastructure abuse, identity pressure, and adversary workflows worth modeling.

12 red-team reads

Blue Team Lens

Defense Patterns

Detection engineering, user reporting, authentication controls, and response playbooks security teams can operationalize.

21 blue-team reads

GitHub Trends

Project Radar

20 live
  • Dual-use project0xDanielLopez/TweetFeedRepo · 655 stars
  • Blue team toolsjhgvr/oisdRepo · 202 stars
  • Dual-use projectWhoisFreaks/daily-expired-and-dropped-domainsRepo · 6 stars

New Today

Fresh intel since the last refresh

0 new articles, 2 new projects

Projects

  • Blue team toolZaczero/pihole-phishtank

    Shell13 stars

  • Blue team toolPhishing-Database/Phishing.Database

    1,549 stars

Blue TeamDefense Pattern

Lead Story

Blue TeamFeaturedThreat TrendsMay 6, 2026

Unmanaged OAuth Grants Are the SaaS Back Door Hiding in Plain Sight

The phishing lesson is that attackers do not always need a fresh credential when a trusted app token already has delegated access.

Persistent OAuth grants let third-party apps keep operating after the original login, password reset, or employee lifecycle event has faded from view.

Read more:The Hacker NewsMicrosoft Learn

By PhishPond Desk · 8 min read

Now Reading

Latest Stories

  • Compliance Lures Are Becoming Multi-Stage AiTM Token Traps
  • Detect OAuth Abuse by Watching What Apps Do After Consent
  • OAuth Consent Governance Needs a Front Door and a Cleanup Crew
  • Research Note: Octo Tempest and Scattered Spider Show Why Help Desk Identity Is Attack Surface
  • RMM Phishing Turns the Click Into Remote Access
  • The Drift Token Lesson Is SaaS Blast Radius, Not Just Vendor Risk

Live Collection

Outside Intel Watch

Articles & Analysis

5 tracked
  • Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads

    The Hacker NewsMay 8, 2026News

    Finance workflows remain exposed when trust signals come from compromised inboxes.

    Read more:The Hacker News

  • Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

    The Hacker NewsMay 8, 2026News

    Trusted suppliers and developer channels can carry phishing risk past normal filters.

    Read more:The Hacker News

  • New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials

    The Hacker NewsMay 8, 2026News

    Identity and session abuse can turn a single successful lure into account takeover.

    Read more:The Hacker News

  • When prompts become shells: RCE vulnerabilities in AI agent frameworks

    Microsoft Security BlogMay 7, 2026Vendor Research

    Mailbox and payment workflow abuse creates business risk without malware.

    Read more:Microsoft Security Blog

  • New PCPJack worm steals credentials, cleans TeamPCP infections

    BleepingComputerMay 7, 2026News

    Identity and session abuse can turn a single successful lure into account takeover.

    Read more:BleepingComputer

GitHub Project Radar

5 tracked
  • Dual-use project0xDanielLopez/TweetFeed

    655 starspushed May 11, 2026

    TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes. 655 stars.

    Open project:GitHub

    #blueteam#malware#malware-detection#malware-research

  • Blue team toolsjhgvr/oisd

    202 starspushed May 11, 2026

    oisd blocklist 202 stars.

    Open project:GitHub

    #adblocking#adblocking-dns#adblocking-list#adblocklist

  • Dual-use projectWhoisFreaks/daily-expired-and-dropped-domains

    6 starspushed May 11, 2026

    A public, research-focused dataset of expired, and recently dropped domains curated for cybersecurity analysis, brand monitoring, threat intelligence, and market research. 6 stars.

    Open project:GitHub

    #daily-dropped-domains#daily-expired-domains#domain-intelligence#drop-lists

  • Dual-use projectphishdestroy/destroylist

    HTML999 starspushed May 11, 2026

    Real-time phishing & scam domain blocklist — 130k+ curated threats, 888K+ community, free API, multiple formats Primary language: HTML. 999 stars.

    Open project:GitHub

    #anti-phishing#blacklist#blocklist#crypto-scam

  • Blue team toolZaczero/pihole-phishtank

    Shell13 starspushed May 11, 2026

    🐟 PhishTank Blocklist for Pi-hole Primary language: Shell. 13 stars.

    Open project:GitHub

    #blocklist#hosts#phishing#pihole

Reader Map

Choose the signal you need

News

Fast-turn reporting from tracked security sources.

Threat Trends

Editorial coverage for threat trends workflows.

Campaign Analysis

Editorial coverage for campaign analysis workflows.

Email Security

Editorial coverage for email security workflows.

Tooling & Detection

Editorial coverage for tooling & detection workflows.

Research

Longer analysis tied to practical defender outcomes.

Search Tool

Search Intelligence

Search article titles, authors, tags, and body text across the PhishPond archive.

Showing 2 matching stories.Clear search

Search Results for "Consent Governance"

Field Analysis

Blue TeamTooling & DetectionMay 6, 20267 min read

OAuth Consent Governance Needs a Front Door and a Cleanup Crew

Restricting new consent is only half the work. Existing app grants need review, ownership, and a path to removal when risk changes.

Read more:Microsoft LearnMicrosoft Learn

By PhishPond Desk

  • #OAuth
  • #Microsoft Entra
  • #Google Workspace

Field Analysis

Blue TeamResearchApr 22, 202610 min read

Research Note: OAuth Consent Debt Builds Quietly Until Incident Response Needs It Gone

OAuth app grants accumulate over time, and stale consent can become a hidden access path when vendors, users, or integrations are later compromised.

Read more:Microsoft LearnThe Hacker News

By PhishPond Desk

  • #OAuth
  • #SaaS Security
  • #Consent Governance

Radar Shortcuts

  • All GitHub radar projects
  • Red team reads
  • Blue team reads

Trending Topics

  • #BEC
  • #Session Hijacking
  • #QR Phishing
  • #Mailbox Rules
  • #Detection Engineering

Latest News

  • Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads

    The Hacker NewsMay 8, 2026

  • Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

    The Hacker NewsMay 8, 2026

  • New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials

    The Hacker NewsMay 8, 2026

  • When prompts become shells: RCE vulnerabilities in AI agent frameworks

    Microsoft Security BlogMay 7, 2026

Editorial Signals

  • Every article includes a defender takeaway.
  • Source links are surfaced with each story.
  • Red-team framing avoids operational abuse guidance.

Subscribe to the Weekly PhishPond Brief

Get campaign breakdowns, threat trend signals, and defender-focused mitigations in one concise publication.

No spam. Unsubscribe anytime. Subscriber details are used only for this publication.