#phishing

[ follow ]
Information security
fromBusiness Insider
3 days ago

Holiday shopping is just around the corner, and so are the shipping scams

Ending the de minimis exemption means low-value international packages now face duties, creating confusion that scammers exploit with fake customs and delivery notices.
#data-breach
fromIT Pro
3 days ago
Information security

LNER warns customers to remain vigilant after personal data exposed in cyber attack

fromIT Pro
3 days ago
Information security

LNER warns customers to remain vigilant after personal data exposed in cyber attack

#npm
fromSecuritymagazine
4 days ago
Information security

2B Weekly Downloads at Risk: Supply Chain Attack Targets Popular npm Packages, Security Leaders Discuss

fromZDNET
5 days ago
Information security

This 2FA phishing scam pwned a developer - and endangered billions of npm downloads

fromSecuritymagazine
4 days ago
Information security

2B Weekly Downloads at Risk: Supply Chain Attack Targets Popular npm Packages, Security Leaders Discuss

fromZDNET
5 days ago
Information security

This 2FA phishing scam pwned a developer - and endangered billions of npm downloads

#email-security
fromTechCrunch
4 days ago
Information security

Google's former security leads raise $13M to fight email threats before they reach you | TechCrunch

fromBuzzFeed
1 month ago
Privacy professionals

A New Email Scam Is Shockingly Realistic, Here's Everything You Need To Know About Protecting Yourself

fromTechCrunch
4 days ago
Information security

Google's former security leads raise $13M to fight email threats before they reach you | TechCrunch

fromBuzzFeed
1 month ago
Privacy professionals

A New Email Scam Is Shockingly Realistic, Here's Everything You Need To Know About Protecting Yourself

#scams
Information security
fromThe Hacker News
5 days ago

Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks

Threat actors exploit Axios and Microsoft Direct Send to spoof trusted senders, bypass gateways, and drive highly successful phishing and account takeover campaigns across industries.
Information security
fromThe Hacker News
5 days ago

From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks

MostereRAT uses EPL-developed staged payloads, mTLS-protected C2, security-tool disabling, and plugin deployment to gain full control and stealthily persist on infected systems.
#icloud-calendar
Information security
fromSecuritymagazine
6 days ago

Account Profile Scam Targets PayPal Users

Sophisticated phishing campaign spoofs PayPal emails to prompt victims to call scam-linked numbers or click links that grant attackers secondary account access.
#stealerium
Information security
fromTechzine Global
1 week ago

Varonis acquires SlashNext for email security

SlashNext's multi-channel phishing detection combined with Varonis' AI-driven data security enables earlier detection and prevention of AI-powered social-engineering attacks before data breaches occur.
Information security
fromThe Hacker News
1 week ago

VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages

Attackers use obfuscated SVG files with embedded JavaScript to deliver Base64-encoded phishing pages impersonating Colombia's judiciary and trigger hidden ZIP malware downloads.
Information security
fromChannelPro
1 week ago

Varonis snaps up AI email security specialist SlashNext

Varonis will acquire SlashNext to integrate AI-native multi-channel phishing detection into its platform, enhancing protection against AI-generated threats across email and messaging.
#gmail
#upcrypter
fromwww.theguardian.com
2 weeks ago

The good news is, you're owed a tax refund. The bad news? It's a scam

Tax calculations can be, well, taxing, so a message from HMRC saying that there's been a mistake may not ring too many alarm bells. Some bring good news: you have overpaid and are owed a refund, but others claim you owe money. In both cases there's an imminent deadline to act sometimes with the threat of legal action, or penalties if you don't. Scammers are taking advantage of people's fears over bills to steal personal and banking information.
Information security
fromWIRED
2 weeks ago

Scammers Will Try to Trick You Into Filling Out Google Forms. Don't Fall for It

These forms can be created in minutes, with clean and clear formatting, official-looking images and video, and-most importantly of all-a genuine Google Docs URL that your web browser will see no problem with. Scammers can then use these authentic-looking forms to ask for payment details or login information. It's a type of scam that continues to spread, with Google itself issuing a warning about the issue in February.
Information security
Artificial intelligence
fromTechzine Global
2 weeks ago

Anthropic blocks misuse of Claude for cybercrime

Anthropic blocked attempts to misuse Claude for phishing, malware development, filter circumvention, and influence campaigns, banning accounts and tightening filters to mitigate risks.
#identity-security
fromTheregister
2 weeks ago
Information security

Report declares 'identity crisis' amid rising login attacks

Security leaders increasingly distrust identity providers due to complexity, poor visibility, inadequate MFA coverage, and rising credential-focused attacks.
fromSecuritymagazine
3 weeks ago
Privacy professionals

Survey Reveals Top Challenges of Implementing Identity Security

A significant gap exists between the need for identity security and its implementation across organizations.
Information security
fromEntrepreneur
2 weeks ago

AI-Driven Scams Are Draining Retirement Funds | Entrepreneur

The Phantom Hacker Scam uses AI-driven, three-pronged phishing to steal seniors' retirement funds through tech support, bank, and government impersonation.
Information security
fromTechzine Global
2 weeks ago

Phishing campaign targets Teams and Zoom with RMM tool

Attackers hijack ConnectWise ScreenConnect via AI-driven phishing that impersonates Zoom/Teams, using cloud obfuscation to gain administrator access and enable lateral movement and credential theft.
Science
fromSecuritymagazine
2 weeks ago

Agentic AI Browsers Exploited by "PromptFix" Trick Technique

A new prompt injection technique uses fake CAPTCHA pages to trick generative AI agents into executing malicious actions and visiting lookalike storefronts.
Information security
fromIT Pro
3 weeks ago

Employee distraction is now your biggest cybersecurity risk

Distracted and undertrained staff, not sophisticated threats, cause the majority of cyber incidents, with phishing as the primary attack vector.
fromAbc
3 weeks ago

How a request for a video of a dress led to the seller losing $950

"Usually, I am pretty onto it and I have helped other friends avoid scams," she said. "For it to happen to me ... this situation got me off guard."
E-Commerce
Information security
fromThe Hacker News
3 weeks ago

Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

Phishing emails deliver RAR archives whose filenames contain Base64-encoded Bash commands that execute VShell via shell command injection when file names are parsed.
#tax-scams
Information security
fromLifehacker
3 weeks ago

This Creative Phishing Scam Uses Netflix Job Offers to Steal Facebook Credentials

Scammers impersonate Netflix recruiters to phish jobseekers, steal Facebook credentials, and compromise business accounts to run malicious ads or demand ransoms.
Information security
fromABC7 Los Angeles
3 weeks ago

Don't click on that text claiming to be from Amazon. Here's what to know about the scam

Scammers send fake Amazon texts claiming refunds or recalls to phish for personal information and money; verify via the Amazon app/website and report spam to 7726.
#cybersecurity
fromIT Pro
3 weeks ago
Privacy professionals

Malicious URLs overtake email attachments as the biggest malware threat

fromIT Pro
1 month ago
Canada news

Everything we know so far about the Canadian House of Commons data breach

Privacy technologies
fromThe Hacker News
1 month ago

AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims

Legitimate AI tools are being misused to create replica phishing sites mimicking Brazilian government agencies.
fromIT Pro
3 weeks ago
Privacy professionals

Malicious URLs overtake email attachments as the biggest malware threat

fromIT Pro
1 month ago
Canada news

Everything we know so far about the Canadian House of Commons data breach

Privacy professionals
fromTechCrunch
1 month ago

After researchers unmasked a prolific SMS scammer, a new operation has emerged in its wake | TechCrunch

A prolific SMS scam operation has targeted victims by impersonating delivery and toll notifications to steal credit card information.
#malware
Privacy technologies
fromArs Technica
1 month ago

Here's how deepfake vishing attacks work, and why they can be hard to detect

AI voice cloning poses significant risks through fraudulent calls mimicking known individuals, increasing the efficiency of phishing schemes.
fromThe Hacker News
1 month ago

ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections

"Like a real-world virus variant, this new 'ClickFix' strain quickly outpaced and ultimately wiped out the infamous fake browser update scam that plagued the web just last year."
Privacy professionals
Marketing tech
fromOCCRP
1 month ago

Behind the Scam: How Fraudsters Use Social Media, Software, and Shell Companies to Steal Millions

Affiliate marketers use phishing ads to collect victim data for call centers offering fake investment opportunities.
fromCSO Online
1 month ago

Supply chain attack compromises npm packages to spread backdoor malware

In a newly discovered supply chain attack, attackers last week targeted a range of npm-hosted JavaScript type testing utilities, several of which were successfully compromised to distribute malware.
JavaScript
US politics
fromwww.theguardian.com
1 month ago

UK student jailed for selling phishing kits linked to 100m of fraud

Ollie Holman was jailed for seven years for creating phishing kits that defrauded individuals and organizations globally.
fromwww.bbc.com
1 month ago

University student who sold fraud kits jailed

Holman created and sold 1,052 kits which provided fraudulent webpages with built-in scripts to enable the harvesting of information entered, including account log-in details and bank details.
Privacy technologies
Mobile UX
fromSecuritymagazine
1 month ago

5M Public, Unsecured Wi-Fi Networks Found Exposed

Mobile threats are increasing, with phishing, app vulnerabilities, and unsecured Wi-Fi posing significant risks to corporate data.
Digital life
fromZDNET
1 month ago

6 ways to protect your passport and other travel docs from cybercriminals - before it's too late

Travel documents, if scanned or stored digitally, are vulnerable to theft and exploitation.
fromIT Pro
2 months ago

Arrests made after huge HMRC scam campaign hit 100,000 accounts

These arrests show we work across borders with our international partners to combat tax crime in all its forms. We have a number of live criminal investigations, and we are grateful to our Romanian partners for their support.
Privacy professionals
Privacy technologies
fromZDNET
2 months ago

Phishers built fake Okta and Microsoft 365 login sites with AI - here's how to protect yourself

Hackers are utilizing AI to create sophisticated phishing sites that replicate legitimate webpages, posing significant security threats.
fromZDNET
2 months ago

Got a suspicious UPS text? Don't reply - it might be a scam. Here's how to tell

This particular UPS scam is a savvy one, at least in some ways. I received the message on my iPhone, with the sender labeled as unknown. By default, links in a text message from an unknown sender are disabled, so you can't click on them to open them. But the scammer used a sneaky trick to get around this obstacle.
Privacy professionals
Privacy professionals
fromIT Pro
2 months ago

Hackers are using Microsoft 365 features to bombard enterprises with phishing emails - and they've already hit more than 70 organizations

A new phishing campaign exploits Microsoft's 365 Direct Send feature, targeting organizations without needing user credentials, leading to successful credential theft.
[ Load more ]