#phishing

[ follow ]
#generative-ai
fromComputerworld
5 days ago

Scammers try to trick LastPass users into giving up credentials by telling them they're dead

If a person dies, their immediate family may not know how to get into the deceased's password manager, and may contact the vendor asking for access. Scammers suspected of being part of the CryptoChameleon cyber criminal group are trying to take advantage of that by sending oddly-worded phishing messages to LastPass customers. The goal, presumably, is not only to get LastPass login credentials, but also to access the user's cryptocurrency wallet and drain its contents.
Information security
#clickfix
fromZDNET
1 week ago
Information security

How Clickfix and AI are helping hackers break into your systems - at an alarming rate

fromZDNET
1 week ago
Information security

ClickFix attacks are surging, and Microsoft says you are the only defense

fromZDNET
1 week ago
Information security

How Clickfix and AI are helping hackers break into your systems - at an alarming rate

fromZDNET
1 week ago
Information security

ClickFix attacks are surging, and Microsoft says you are the only defense

fromKOMO
1 week ago

Job recruiting scam texts may be linked to government shutdown, according to expert

"I would say [I get them] two or three times a week. Sometimes I get multiple texts in one day. A lot of it is almost catfish, where they tell you you can work from home for x amount of money per week," said Sheree Delice.
US news
fromABC7 Los Angeles
1 week ago

North Carolina man's crypto account drained of $80,000 after he clicks on link for virtual meeting

"I started to create videos about cryptocurrency and launch my own exchange on cryptocurrency," the Durham, North Carolina, resident said.
Information security
fromThe Hacker News
1 week ago

Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT

The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to target Japan and Malaysia with another remote access trojan (RAT) tracked as HoldingHands RAT (aka Gh0stBins). "The campaign relied on phishing emails with PDFs that contained embedded malicious links," Pei Han Liao, researcher with Fortinet's FortiGuard Labs, said in a report shared with The Hacker News.
Information security
Information security
fromZDNET
1 week ago

Dashlane debuts passwordless access to its password manager - but beware this major hitch

Dashlane now supports FIDO passkeys for passwordless desktop logins, aiming to reduce phishing by eliminating passwords, though mobile support arrives later.
fromFortune
1 week ago

Gen Z's digital native status is a double-edged sword. They have cyber blind spots | Fortune

Members of Gen Z are often referred to as "digital natives." They were born and raised in the internet era and have been engaging with computers, tablets, smartphones, and other connected devices from an early age. In many ways, this gives Gen Z an advantage in today's increasingly digital working environments-but that isn't always the case. In fact, research has consistently shown that each generation has its own unique blind spots when it comes to safely navigating the digital realm.
Information security
Information security
fromIT Pro
1 week ago

77% of security leaders say they'd fire staff who fall for phishing scams, even though they've done the same thing

Security leaders click phishing links at high rates while often punishing staff, and improved, education-first training significantly reduces long-term phishing risk.
#credential-theft
fromIT Pro
1 week ago
Information security

Been offered a job at Google? Think again. This new phishing scam is duping tech workers looking for a career change

fromIT Pro
1 week ago
Information security

Been offered a job at Google? Think again. This new phishing scam is duping tech workers looking for a career change

Information security
fromThe Hacker News
2 weeks ago

Researchers Expose TA585's MonsterV2 Malware Capabilities and Attack Chain

TA585 independently conducts sophisticated phishing and web-injection campaigns to deliver MonsterV2 RAT via ClickFix social engineering and PowerShell-based payload execution.
fromThe Hacker News
2 weeks ago

Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns

"Instead of relying solely on traditional command-and-control (C2) servers that can be taken down, these attackers are leveraging GitHub repositories to host malware configurations," McAfee Labs researchers Harshil Patel and Prabudh Chakravorty said in a report. "When law enforcement or security researchers shut down their C2 infrastructure, Astaroth simply pulls fresh configurations from GitHub and keeps running."
Information security
#phishing-as-a-service
Information security
fromArs Technica
2 weeks ago

"Payroll Pirate" phishing scam that takes over Workday accounts steals paychecks

Attackers use phishing and adversary-in-the-middle techniques to steal Workday credentials and MFA codes, then change payroll settings to divert direct-deposit payments to their accounts.
Cryptocurrency
fromcointelegraph.com
2 weeks ago

Crypto safety 2025: 7 easy ways to avoid hacks and scams

Everyday phishing, malicious approvals, and SIM swaps cause most crypto thefts; phishing-resistant 2FA, careful signing, wallet separation, clean devices, and recovery plans greatly reduce risk.
Information security
fromThe Hacker News
2 weeks ago

Microsoft Warns of 'Payroll Pirates' Hijacking HR SaaS Accounts to Steal Employee Salaries

Storm-2657 hijacks employee HR SaaS accounts via phishing and AitM attacks, then redirects salary payments to attacker-controlled bank accounts by modifying payment settings.
#cybercrime
fromDataBreaches.Net
1 month ago
Information security

Microsoft seizes 338 websites to disrupt rapidly growing 'RaccoonO365' phishing service - DataBreaches.Net

fromDataBreaches.Net
1 month ago
Information security

Microsoft seizes 338 websites to disrupt rapidly growing 'RaccoonO365' phishing service - DataBreaches.Net

#cybersecurity
fromZDNET
4 weeks ago
Information security

4 better ways to protect your business than dreaded (and useless) anti-phishing training

fromDataBreaches.Net
1 month ago
Information security

Stellantis detects breach at third-party provider for North American customers - DataBreaches.Net

Stellantis detected unauthorized access to a third-party platform supporting North American customer service that exposed only basic contact information, not financial or sensitive personal data.
fromBusiness Insider
1 month ago
Information security

I'm a principal security engineer at Microsoft. Here are 5 things you should know if you're interested in working in cybersecurity.

Cybersecurity work requires adaptability, incident-response skills, calm under pressure, networking, and offers entry-level salaries around $105,000.
fromZDNET
4 weeks ago
Information security

4 better ways to protect your business than dreaded (and useless) anti-phishing training

fromBusiness Insider
1 month ago
Information security

I'm a principal security engineer at Microsoft. Here are 5 things you should know if you're interested in working in cybersecurity.

#npm
fromZDNET
1 month ago
Information security

This 2FA phishing scam pwned a developer - and endangered billions of npm downloads

fromZDNET
1 month ago
Information security

This 2FA phishing scam pwned a developer - and endangered billions of npm downloads

fromThe Hacker News
2 weeks ago

New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps

A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and lookalike phishing websites by impersonating popular apps like WhatsApp, Google Photos, TikTok, and YouTube as lures to install them. "Once active, the spyware can exfiltrate SMS messages, call logs, notifications, and device information; taking photos with the front camera; and even send SMS messages or place calls directly from the victim's device," Zimperium researcher Vishnu Pratapagiri said in a report shared with The Hacker News.
Information security
Information security
fromChannelPro
2 weeks ago

DNS Security 101: Safeguarding your business from cyber threats

Organizations must strengthen DNS security to prevent phishing, malware distribution, domain and subdomain hijacking, and other cyberattacks exploiting lookalike domains.
#ai-misuse
fromTechzine Global
3 weeks ago
Artificial intelligence

OpenAI reports growing misuse of AI by states and criminals

OpenAI disrupted international networks using its models for cyberattacks, scams, and political influence while strengthening defenses to block and detect malicious AI use.
fromBusiness Insider
1 month ago
Information security

Fake military IDs, bogus resumes: How North Korean and Chinese hackers use AI tools to infiltrate companies and other targets

North Korean and Chinese hackers use AI tools like ChatGPT and Claude to create fake IDs, résumés, and phishing materials to enable espionage and unauthorized access.
fromBusiness Insider
1 month ago
Information security

Fake military IDs, bogus resumes: How North Korean and Chinese hackers use AI tools to infiltrate companies and other targets

Information security
fromTechzine Global
3 weeks ago

Kaseya acquires INKY for AI-driven email security

Kaseya's acquisition of INKY equips MSPs with generative-AI and behavioral-analysis email protection to detect and respond to advanced phishing attacks.
Information security
fromThe Hacker News
3 weeks ago

XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities

XWorm is a modular, evolving malware platform enabling data theft, persistence, remote control, and other attacks through plugins and phishing-based distribution.
Information security
fromBusiness Matters
3 weeks ago

Online Justice Takes Aim at Rising Phishing and Money Scams with Recovery Services

Link-based phishing can swiftly steal personal data and funds; immediate, structured recovery using human expertise and cyber-intelligence improves victim outcomes and disrupts fraud.
UK news
fromwww.theguardian.com
3 weeks ago

Six out of 10 UK secondary schools hit by cyber-attack or breach in past year

UK educational institutions face disproportionately high cyber-attacks, with schools and universities frequently targeted by phishing, access-broker-facilitated breaches, and ransomware.
Information security
fromThe Hacker News
3 weeks ago

Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL

SORVEPOTEL is self-propagating malware spreading via WhatsApp to compromise Windows systems in Brazil, prioritizing rapid propagation over data theft or ransomware.
Information security
fromThe Hacker News
3 weeks ago

New "Cavalry Werewolf" Attack Hits Russian Agencies with FoalShell and StallionRAT

Cavalry Werewolf, linked to YoroTrooper, targets Russian state agencies using FoalShell and StallionRAT delivered via Kyrgyzstan-themed phishing and malicious RARs.
Information security
fromIT Pro
3 weeks ago

Foreign states ramp up cyber attacks on EU with AI-driven phishing and DDoS campaigns

EU public administration faces intense state-aligned cyberespionage; phishing drives initial intrusions, hacktivist DDoS dominates incident counts, and vulnerability exploitation remains significant.
Information security
fromTalentLMS Blog
3 weeks ago

10 Essential Cybersecurity Topics for Employee Training

Comprehensive cybersecurity training for all employees prevents breaches, protects data, preserves customer trust, and reduces financial, legal, and reputational damage.
#security-training
fromZDNET
1 month ago
Information security

Phishing training doesn't stop your employees from clicking scam links - here's why

fromZDNET
1 month ago
Privacy professionals

Employees learn close to nothing from phishing training, and this is why

fromZDNET
1 month ago
Information security

Phishing training doesn't stop your employees from clicking scam links - here's why

fromZDNET
1 month ago
Privacy professionals

Employees learn close to nothing from phishing training, and this is why

Information security
fromThe Hacker News
1 month ago

Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email Security

Threat actors used LLM-generated code to obfuscate SVG-based phishing payloads targeting U.S. organizations, enabling credential theft while evading security defenses.
Information security
fromThe Hacker News
1 month ago

Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam

Phishing campaign impersonating Ukrainian agencies uses SVG-based emails to deliver CountLoader that installs Amatera Stealer and PureMiner (fileless .NET, process hollowing).
fromZDNET
1 month ago

Employees learn nothing from phishing security training, and this is why

The , conducted by UC San Diego Health and Censys researchers, found that phishing-related cybersecurity training programs had no effect on whether or not employees were duped by phishing emails. After analyzing the results of 10 different phishing email campaigns sent to over 19,500 employees at UC San Diego Health over eight months, the researchers found "no significant relationship between whether users had recently completed an annual, mandated cybersecurity training and the likelihood of falling for phishing emails."
Tech industry
#pypi
Toronto
fromwww.cbc.ca
1 month ago

Phishing scam targeting U of T students, demanding payment for outstanding fees, police warn | CBC News

Students are being targeted by phishing emails impersonating the University of Toronto demanding immediate e-transfer payments for alleged outstanding tuition.
Information security
fromTheregister
1 month ago

Kaspersky: RevengeHotels returns with AI-coded malware

RevengeHotels uses AI-generated malware to enhance hotel phishing attacks, producing variants that evade detection and increase risk of guest card and personal data theft.
Information security
fromZDNET
1 month ago

FBI warns its scam reporting site is being spoofed - how to avoid getting tricked

Scammers are creating spoofed websites impersonating the FBI’s IC3 to steal personal and financial information and facilitate monetary scams.
Information security
fromThe Hacker News
1 month ago

ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks

ComicForm conducted phishing since April 2025 targeting Belarus, Kazakhstan, and Russia to deploy Formbook via multi-stage .NET malware.
Information security
fromSecurityWeek
1 month ago

FBI Warns of Spoofed IC3 Website

Threat actors are spoofing the FBI IC3 website to steal personal and financial information; users should access www.ic3.gov directly and avoid suspicious links.
Information security
fromInfoWorld
1 month ago

NPM attacks and the security of software supply chains

Process improvements and sustainable funding provide far more protection for open-source software supply chains than isolated technical guardrails.
#revengehotels
#ta415
Information security
fromBusiness Matters
1 month ago

The Role of IT Support in Cyber Security Awareness Training

Effective cyber security awareness training led by IT support teams reduces human error, prevents breaches, and makes cyber safety second nature across organizations.
Information security
fromPCWorld
1 month ago

Protect your small business from remote working's biggest security nightmares

Small businesses must secure remote and hybrid work to protect employees, data, finances, and reputation from threats such as man-in-the-middle and phishing attacks.
fromComputerWeekly.com
1 month ago

Microsoft scores win against Office 365 credential thieves | Computer Weekly

Investigators from Microsoft's Digital Crimes Unit (DCU) have disrupted the network behind the dangerous RaccoonO365 infostealer malware that targeted the usernames and credentials of Office 365 users after being granted a court order in the Southern District of New York. The operation saw a total of 338 websites linked to the popular malware seized and its technical infrastructure disrupted, severing RaccoonO365 users' access to their victims.
Information security
Information security
fromSecuritymagazine
1 month ago

When Employees Help Hackers: How Threat Actors Bypass MFA

Criminals increasingly bypass MFA by tricking employees with sophisticated phishing, driving business email compromise and largely irretrievable wire fraud losses.
Information security
fromTheregister
1 month ago

Microsoft, Cloudflare shut down RaccoonO365 phishing domains

Microsoft seized 338 RaccoonO365 websites and identified leader Joshua Ogundipe, disrupting a subscription-based phishing service that stole Microsoft 365 credentials.
Information security
fromThe Hacker News
1 month ago

New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site

A FileFix variant is being used to deliver StealC malware via phishing pages that trick users into executing commands and downloading malicious images from Bitbucket.
Information security
fromFortune
1 month ago

North Korean hackers used ChatGPT to help forge deepfake ID | Fortune

A suspected North Korean hacking group used ChatGPT to create a deepfake military ID image to support a phishing attack on a South Korean target.
Information security
fromBusiness Insider
1 month ago

Holiday shopping is just around the corner, and so are the shipping scams

Ending the de minimis exemption means low-value international packages now face duties, creating confusion that scammers exploit with fake customs and delivery notices.
Information security
fromIT Pro
1 month ago

LNER warns customers to remain vigilant after personal data exposed in cyber attack

Customer contact details and journey history were exposed in a third-party cyber attack; payment and password data were not exposed, but phishing risk has increased.
fromTechCrunch
1 month ago

Google's former security leads raise $13M to fight email threats before they reach you | TechCrunch

As AI is increasingly helping hackers to launch mass-scale email attacks, former Google security leaders have joined forces to build autonomous AI agents that aim to stop phishing, malware, and business email compromise threats before they ever reach user inboxes. That is the mission behind AegisAI, a new email security startup that has just emerged from stealth with $13 million in seed funding co-led by Accel and Foundation Capital.
Information security
fromThe Nation
1 month ago

We're Living in an Age of Scams

Purported Microsoft employees tried to get control of my computer by claiming it was about to self-destruct. (My husband almost fell for that one.) I got numerous realistic-sounding robocalls asking for donations to charities that probably don't exist. Women with lovely telephone voices claimed to have discovered my 2009 book of poems and told me their companies could make it a big commercial success.
Information security
Information security
fromThe Hacker News
1 month ago

Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks

Threat actors exploit Axios and Microsoft Direct Send to spoof trusted senders, bypass gateways, and drive highly successful phishing and account takeover campaigns across industries.
Information security
fromThe Hacker News
1 month ago

From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks

MostereRAT uses EPL-developed staged payloads, mTLS-protected C2, security-tool disabling, and plugin deployment to gain full control and stealthily persist on infected systems.
#icloud-calendar
#stealerium
Information security
fromTechzine Global
1 month ago

Varonis acquires SlashNext for email security

SlashNext's multi-channel phishing detection combined with Varonis' AI-driven data security enables earlier detection and prevention of AI-powered social-engineering attacks before data breaches occur.
Information security
fromThe Hacker News
1 month ago

VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages

Attackers use obfuscated SVG files with embedded JavaScript to deliver Base64-encoded phishing pages impersonating Colombia's judiciary and trigger hidden ZIP malware downloads.
Information security
fromChannelPro
1 month ago

Varonis snaps up AI email security specialist SlashNext

Varonis will acquire SlashNext to integrate AI-native multi-channel phishing detection into its platform, enhancing protection against AI-generated threats across email and messaging.
#gmail
#upcrypter
fromwww.theguardian.com
1 month ago

The good news is, you're owed a tax refund. The bad news? It's a scam

Tax calculations can be, well, taxing, so a message from HMRC saying that there's been a mistake may not ring too many alarm bells. Some bring good news: you have overpaid and are owed a refund, but others claim you owe money. In both cases there's an imminent deadline to act sometimes with the threat of legal action, or penalties if you don't. Scammers are taking advantage of people's fears over bills to steal personal and banking information.
Information security
fromWIRED
1 month ago

Scammers Will Try to Trick You Into Filling Out Google Forms. Don't Fall for It

These forms can be created in minutes, with clean and clear formatting, official-looking images and video, and-most importantly of all-a genuine Google Docs URL that your web browser will see no problem with. Scammers can then use these authentic-looking forms to ask for payment details or login information. It's a type of scam that continues to spread, with Google itself issuing a warning about the issue in February.
Information security
Artificial intelligence
fromTechzine Global
2 months ago

Anthropic blocks misuse of Claude for cybercrime

Anthropic blocked attempts to misuse Claude for phishing, malware development, filter circumvention, and influence campaigns, banning accounts and tightening filters to mitigate risks.
Information security
fromTheregister
2 months ago

Report declares 'identity crisis' amid rising login attacks

Security leaders increasingly distrust identity providers due to complexity, poor visibility, inadequate MFA coverage, and rising credential-focused attacks.
Information security
fromEntrepreneur
2 months ago

AI-Driven Scams Are Draining Retirement Funds | Entrepreneur

The Phantom Hacker Scam uses AI-driven, three-pronged phishing to steal seniors' retirement funds through tech support, bank, and government impersonation.
Information security
fromTechzine Global
2 months ago

Phishing campaign targets Teams and Zoom with RMM tool

Attackers hijack ConnectWise ScreenConnect via AI-driven phishing that impersonates Zoom/Teams, using cloud obfuscation to gain administrator access and enable lateral movement and credential theft.
Science
fromSecuritymagazine
2 months ago

Agentic AI Browsers Exploited by "PromptFix" Trick Technique

A new prompt injection technique uses fake CAPTCHA pages to trick generative AI agents into executing malicious actions and visiting lookalike storefronts.
Information security
fromIT Pro
2 months ago

Employee distraction is now your biggest cybersecurity risk

Distracted and undertrained staff, not sophisticated threats, cause the majority of cyber incidents, with phishing as the primary attack vector.
fromAbc
2 months ago

How a request for a video of a dress led to the seller losing $950

"Usually, I am pretty onto it and I have helped other friends avoid scams," she said. "For it to happen to me ... this situation got me off guard."
E-Commerce
Information security
fromThe Hacker News
2 months ago

Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

Phishing emails deliver RAR archives whose filenames contain Base64-encoded Bash commands that execute VShell via shell command injection when file names are parsed.
[ Load more ]