<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with bookingcom]]></title><description><![CDATA[A list of topics that have been tagged with bookingcom]]></description><link>https://board.circlewithadot.net/tags/bookingcom</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 04:36:02 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/bookingcom.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[⚠️ 🎣 We’re seeing an ongoing phishing campaign targeting hotels and hosts, impersonating messages from &#x27;Booking.com&#x27; - see sample image below.]]></title><description><![CDATA[️  We’re seeing an ongoing phishing campaign targeting hotels and hosts, impersonating messages from 'Booking.com' - see sample image below.Here’s what we know so far: ️ Emails appear to target actual 'Booking.com' host email addresses, which may indicate that recipient data was obtained from a previous breach - the timing is particularly relevant given the 'Booking.com' data breach last month (see article - https://www.bbc.co.uk/news/articles/cly00jnnxypo).   ️ While the emails appear to come from 'Booking.com', they are actually sent via compromised accounts.   ️ Messages typically reference a “complaint” or “special request” requiring urgent action.   ️ Links often use URL shorteners or services like 'share.google' to hide phishing pages   ️ Goal is to steal login credentials or payment details through fake portalsThese phishing emails are very convincing, so extra caution is prudent - here are some steps you can take to reduce risk:  Be cautious of urgency or pressure in booking-related emails Avoid clicking shortened or unfamiliar links Verify requests by logging into the platform directly Report suspicious emails internally or to the platform provider#CyberSecurity #Phishing #ThreatIntel #InfoSec #BookingCom]]></description><link>https://board.circlewithadot.net/topic/5bb82879-dfe9-4fb0-ba05-4410da906fe5/we-re-seeing-an-ongoing-phishing-campaign-targeting-hotels-and-hosts-impersonating-messages-from-booking.com-see-sample-image-below.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/5bb82879-dfe9-4fb0-ba05-4410da906fe5/we-re-seeing-an-ongoing-phishing-campaign-targeting-hotels-and-hosts-impersonating-messages-from-booking.com-see-sample-image-below.</guid><dc:creator><![CDATA[spamhaus@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>