<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with eviltokens]]></title><description><![CDATA[A list of topics that have been tagged with eviltokens]]></description><link>https://board.circlewithadot.net/tags/eviltokens</link><generator>RSS for Node</generator><lastBuildDate>Mon, 06 Apr 2026 03:45:58 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/eviltokens.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[#TDR analysts uncovered an emerging Phishing-as-a-Service (#PhaaS) platform called #EvilTokens, which offers device code phishing pages and AI-augmented features to automate and scale #BEC workflows.]]></title><link>https://board.circlewithadot.net/topic/6dcae16a-1047-4c36-9d5c-c337c15f9194/tdr-analysts-uncovered-an-emerging-phishing-as-a-service-phaas-platform-called-eviltokens-which-offers-device-code-phishing-pages-and-ai-augmented-features-to-automate-and-scale-bec-workflows.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/6dcae16a-1047-4c36-9d5c-c337c15f9194/tdr-analysts-uncovered-an-emerging-phishing-as-a-service-phaas-platform-called-eviltokens-which-offers-device-code-phishing-pages-and-ai-augmented-features-to-automate-and-scale-bec-workflows.</guid><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[#TDR analysts uncovered an emerging Phishing-as-a-Service (#PhaaS) platform called #EvilTokens, which offers device code phishing pages and AI-augmented features to automate and scale #BEC workflows.]]></title><link>https://board.circlewithadot.net/topic/ec50f1f7-26c5-4915-bff7-835f12133bff/tdr-analysts-uncovered-an-emerging-phishing-as-a-service-phaas-platform-called-eviltokens-which-offers-device-code-phishing-pages-and-ai-augmented-features-to-automate-and-scale-bec-workflows.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/ec50f1f7-26c5-4915-bff7-835f12133bff/tdr-analysts-uncovered-an-emerging-phishing-as-a-service-phaas-platform-called-eviltokens-which-offers-device-code-phishing-pages-and-ai-augmented-features-to-automate-and-scale-bec-workflows.</guid><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[#TDR analysts uncovered an emerging Phishing-as-a-Service (#PhaaS) platform called #EvilTokens, which offers device code phishing pages and AI-augmented features to automate and scale #BEC workflows.]]></title><link>https://board.circlewithadot.net/topic/deb40660-b183-4b84-8841-b05fb7c858ed/tdr-analysts-uncovered-an-emerging-phishing-as-a-service-phaas-platform-called-eviltokens-which-offers-device-code-phishing-pages-and-ai-augmented-features-to-automate-and-scale-bec-workflows.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/deb40660-b183-4b84-8841-b05fb7c858ed/tdr-analysts-uncovered-an-emerging-phishing-as-a-service-phaas-platform-called-eviltokens-which-offers-device-code-phishing-pages-and-ai-augmented-features-to-automate-and-scale-bec-workflows.</guid><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[#TDR analysts uncovered an emerging Phishing-as-a-Service (#PhaaS) platform called #EvilTokens, which offers device code phishing pages and AI-augmented features to automate and scale #BEC workflows.]]></title><link>https://board.circlewithadot.net/topic/50e2466c-66cb-496f-b9db-2785860ff5f1/tdr-analysts-uncovered-an-emerging-phishing-as-a-service-phaas-platform-called-eviltokens-which-offers-device-code-phishing-pages-and-ai-augmented-features-to-automate-and-scale-bec-workflows.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/50e2466c-66cb-496f-b9db-2785860ff5f1/tdr-analysts-uncovered-an-emerging-phishing-as-a-service-phaas-platform-called-eviltokens-which-offers-device-code-phishing-pages-and-ai-augmented-features-to-automate-and-scale-bec-workflows.</guid><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[#TDR analysts uncovered an emerging Phishing-as-a-Service (#PhaaS) platform called #EvilTokens, which offers device code phishing pages and AI-augmented features to automate and scale #BEC workflows.]]></title><description><![CDATA[Our report offers a technical analysis of the EvilTokens kit, its delivery campaigns, and the adversary's infrastructure.]]></description><link>https://board.circlewithadot.net/topic/5a1d7878-7f1a-4191-a48b-9e1103963984/tdr-analysts-uncovered-an-emerging-phishing-as-a-service-phaas-platform-called-eviltokens-which-offers-device-code-phishing-pages-and-ai-augmented-features-to-automate-and-scale-bec-workflows.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/5a1d7878-7f1a-4191-a48b-9e1103963984/tdr-analysts-uncovered-an-emerging-phishing-as-a-service-phaas-platform-called-eviltokens-which-offers-device-code-phishing-pages-and-ai-augmented-features-to-automate-and-scale-bec-workflows.</guid><dc:creator><![CDATA[sekoia_io@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>