#phishing

[ follow ]
#cybersecurity
Information security
fromTechRepublic
1 day ago

Microsoft Flagged 8.3B Phishing Emails in Q1 as QR Codes, CAPTCHAs Rise

Phishing attacks are evolving, utilizing QR codes and modular strategies, requiring comprehensive security measures beyond traditional email defenses.
Information security
fromThe Hacker News
2 days ago

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

New phishing kits are evolving, integrating advanced features for targeted attacks, while security vulnerabilities continue to pose significant risks online.
Information security
fromThe Hacker News
1 day ago

30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

A Vietnamese-linked operation uses Google AppSheet for phishing, compromising around 30,000 Facebook accounts to sell them back through an illicit storefront.
Information security
fromTechRepublic
1 day ago

Microsoft Flagged 8.3B Phishing Emails in Q1 as QR Codes, CAPTCHAs Rise

Phishing attacks are evolving, utilizing QR codes and modular strategies, requiring comprehensive security measures beyond traditional email defenses.
Information security
fromThe Hacker News
2 days ago

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

New phishing kits are evolving, integrating advanced features for targeted attacks, while security vulnerabilities continue to pose significant risks online.
#cybercrime
Information security
fromThe Hacker News
2 weeks ago

FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts

The FBI and Indonesian National Police dismantled a global phishing operation using the W3LL toolkit, preventing over $20 million in fraud.
Information security
fromThe Hacker News
1 month ago

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A phishing campaign targets Spanish-speaking users in Latin America and Europe, delivering banking trojans via malware called Horabot.
Information security
fromThe Hacker News
2 weeks ago

FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts

The FBI and Indonesian National Police dismantled a global phishing operation using the W3LL toolkit, preventing over $20 million in fraud.
Information security
fromThe Hacker News
1 month ago

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A phishing campaign targets Spanish-speaking users in Latin America and Europe, delivering banking trojans via malware called Horabot.
Information security
fromTechCrunch
2 days ago

OpenAI announces new advanced security for ChatGPT accounts, including a partnership with Yubico | TechCrunch

OpenAI launched Advanced Account Security with Yubico to enhance protection against phishing for ChatGPT users.
#robinhood
Deliverability
fromTechRepublic
3 days ago

Hackers Abuse Robinhood Signup Process to Deliver Phishing Emails

Robinhood users received phishing emails that appeared legitimate, exploiting a flaw in the account creation process to steal login credentials.
Deliverability
fromSecurityWeek
4 days ago

Robinhood Vulnerability Exploited for Phishing Attacks

Cybercriminals exploited Robinhood's account creation process to send phishing emails, but no personal information or funds were compromised.
Deliverability
fromTechRepublic
3 days ago

Hackers Abuse Robinhood Signup Process to Deliver Phishing Emails

Robinhood users received phishing emails that appeared legitimate, exploiting a flaw in the account creation process to steal login credentials.
Deliverability
fromSecurityWeek
4 days ago

Robinhood Vulnerability Exploited for Phishing Attacks

Cybercriminals exploited Robinhood's account creation process to send phishing emails, but no personal information or funds were compromised.
#data-breach
Privacy professionals
fromTechRepublic
4 days ago

ADT Confirms Major Data Breach Exposing Millions of Names, Partial SSNs

ADT's home security systems were not compromised, but customer data including names and partial Social Security numbers was exposed in a data breach.
fromEngadget
1 week ago
France news

France's national agency for managing IDs and passports suffered a data breach last week

fromTheregister
2 weeks ago
Privacy professionals

Booking.com warns of possible reservation data exposure

Booking.com warns customers of potential data exposure due to unauthorized access, affecting reservation details but not financial information.
fromTechRepublic
2 months ago
Information security

ShinyHunters Leak 12.4 Million CarGurus Records in Massive Data Dump

ShinyHunters leaked 12.4 million CarGurus records containing personal and financial data, enabling targeted social engineering and phishing attacks against users.
Privacy professionals
fromTechRepublic
4 days ago

ADT Confirms Major Data Breach Exposing Millions of Names, Partial SSNs

ADT's home security systems were not compromised, but customer data including names and partial Social Security numbers was exposed in a data breach.
France news
fromEngadget
1 week ago

France's national agency for managing IDs and passports suffered a data breach last week

France Titres confirmed a security breach exposing personal data, including names and contact information, with potential for phishing attacks.
Privacy professionals
fromTechCrunch
2 weeks ago

Booking.com confirms hackers accessed customers' data | TechCrunch

Hackers accessed Booking.com customers' personal data, including names, emails, and booking details, prompting notifications to affected users.
Privacy professionals
fromTheregister
2 weeks ago

Booking.com warns of possible reservation data exposure

Booking.com warns customers of potential data exposure due to unauthorized access, affecting reservation details but not financial information.
Germany politics
fromThe Local Germany
1 week ago

Germany launches spying probe into Signal attacks targeting MPs

German prosecutors investigate phishing attacks on lawmakers, linked to Russia, highlighting the need for vigilance against espionage threats.
Information security
fromInfoWorld
1 week ago

Offer customers passkeys by default, UK's NCSC tells enterprises

Passkeys are recommended as the primary authentication method due to their security against phishing and credential reuse.
#email-security
fromSecurityWeek
1 week ago
Deliverability

The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface

Email attackers now exploit behavioral weaknesses, using tailored tactics that blend into trusted relationships and workflows, making detection more challenging.
Deliverability
fromSecurityWeek
1 week ago

The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface

Email attackers now exploit behavioral weaknesses, using tailored tactics that blend into trusted relationships and workflows, making detection more challenging.
Information security
fromZDNET
1 week ago

The shadowy SIM farms behind those incessant scam texts - and how to stay safe

SIM farms are used by cybercriminals for financial fraud, spam, phishing, and online product scalping.
Information security
fromSecurityWeek
1 week ago

Dozens of Malicious Crypto Apps Land in Apple App Store

Over two dozen fake cryptocurrency apps targeting iOS users have been found in the Apple App Store, aimed at stealing recovery phrases and private keys.
Information security
fromTechRepublic
1 week ago

Over 800 Android Apps Targeted in PIN-Stealing Trojan Campaign

Hackers exploit Android's overlay feature to capture PINs and monitor user interactions across over 800 apps using banking trojans.
fromSecurityWeek
1 week ago

British Scattered Spider Hacker Pleads Guilty in the US

Buchanan admitted to conducting SMS phishing attacks, bombarding a victim company's employees with hundreds of messages linking to phishing sites designed to harvest credentials and personally identifiable information (PII).
Privacy professionals
#ai-security
Information security
fromTheregister
1 week ago

Prompt injection proves AI models are gullible like humans

Prompt injection attacks exploit AI systems, similar to phishing, by embedding malicious instructions that the AI executes instead of treating as content.
Information security
fromTechRepublic
1 month ago

Researchers Uncover New Phishing Risk Hidden Inside Microsoft Copilot

Attacker-controlled text in emails can manipulate Microsoft Copilot summaries through cross-prompt injection attacks, inserting deceptive alerts into trusted AI interfaces that users find more convincing than suspicious emails.
Information security
fromTheregister
1 week ago

Prompt injection proves AI models are gullible like humans

Prompt injection attacks exploit AI systems, similar to phishing, by embedding malicious instructions that the AI executes instead of treating as content.
Information security
fromTechRepublic
1 month ago

Researchers Uncover New Phishing Risk Hidden Inside Microsoft Copilot

Attacker-controlled text in emails can manipulate Microsoft Copilot summaries through cross-prompt injection attacks, inserting deceptive alerts into trusted AI interfaces that users find more convincing than suspicious emails.
#malware
Information security
fromThe Hacker News
1 month ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Information security
fromThe Hacker News
2 weeks ago

UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

A new malware campaign targeting Ukrainian healthcare institutions has been identified, utilizing deceptive emails to deliver malicious payloads.
Information security
fromTheregister
2 weeks ago

Fake Linux Foundation leader using Slack to phish devs

A malware campaign targets open source developers via Slack, impersonating a Linux Foundation official to steal credentials and compromise systems.
Information security
fromThe Hacker News
1 month ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Information security
fromTechzine Global
2 weeks ago

Attackers are targeting developers via Slack and Google Sites

A targeted phishing campaign exploits trust in the open-source community, tricking developers into providing credentials and installing malicious software.
Information security
fromTechCrunch
2 weeks ago

FBI announces takedown of phishing operation that targeted thousands of victims | TechCrunch

The FBI dismantled a global phishing operation, W3LL, targeting over 17,000 victims and facilitating over $20 million in fraud.
Privacy professionals
fromTechCrunch
3 weeks ago

Hack-for-hire group caught targeting Android devices and iCloud backups | TechCrunch

A hack-for-hire group is targeting journalists and officials in the Middle East and North Africa using phishing and spyware tactics.
Deliverability
fromZDNET
3 weeks ago

How a burner email can protect your inbox - setting one up one is easy and free

A burner email address protects against spam and phishing by providing a temporary, disposable option for account creation.
#scam
NYC politics
fromHoodline
1 month ago

Brooklyn Drivers Slammed With Scam 'Enforcement Action' Texts, NYPD Warns

Brooklyn drivers are targeted by a scam text claiming enforcement action, urging immediate payment to avoid penalties.
NYC politics
fromHoodline
1 month ago

Brooklyn Drivers Slammed With Scam 'Enforcement Action' Texts, NYPD Warns

Brooklyn drivers are targeted by a scam text claiming enforcement action, urging immediate payment to avoid penalties.
Information security
fromFortune
1 month ago

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

North Korean hackers are increasingly targeting individuals in the crypto industry, employing sophisticated deception tactics.
Cryptocurrency
fromnews.bitcoin.com
1 month ago

Kraken User Loses $18.2M in Crypto Social Engineering Attack as Funds Move via Thorchain: ZachXBT

A coordinated theft involved phishing tactics, rapid asset transfers, and laundering of approximately $1.8 million in ether through decentralized protocols.
Information security
fromTechzine Global
1 month ago

Major phishing campaign on GitHub using fake security alerts

A large-scale phishing campaign targets developers on GitHub, exploiting Discussions to spread fake security alerts about Visual Studio Code and distribute malware.
Information security
fromThe Hacker News
1 month ago

AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion

Threat actors are using AitM phishing to compromise TikTok for Business accounts, targeting business accounts for malvertising and malware distribution.
Information security
fromInfoQ
1 month ago

Securing the AI Stack: From Model to Production

AI has transformed phishing into a high-velocity threat, requiring modern defenses to adopt similar layered tactics.
Information security
fromTheregister
1 month ago

Lightning-fast exploits mean patch fast, says Cisco Talos

Strengthening MFA policies and enhancing anti-phishing training are critical as attackers exploit vulnerabilities rapidly and effectively.
Information security
fromThe Hacker News
1 month ago

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging applications targeting individuals of high intelligence value.
Privacy technologies
fromTechRepublic
1 month ago

Apple Mail's 'Trusted Sender' Label Misused in New Phishing Scheme

Apple Mail's 'trusted sender' label can mislead users, allowing phishing scams to exploit perceived familiarity without verifying sender legitimacy.
#online-scams
Privacy professionals
fromThe Mercury News
1 month ago

Larry Magid: Beware of online scams

Americans lost at least $16.6 billion to scams in 2024, with older adults over 60 losing more than $4.8 billion, primarily through phishing and romance scams that exploit trust and technology unfamiliarity.
Privacy professionals
fromThe Mercury News
1 month ago

Larry Magid: Beware of online scams

Americans lost at least $16.6 billion to scams in 2024, with older adults over 60 losing more than $4.8 billion, primarily through phishing and romance scams that exploit trust and technology unfamiliarity.
Information security
fromThe Hacker News
1 month ago

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

Russian state-sponsored APT28 deployed two new malware families, BadPaw and MeowMeow, targeting Ukrainian entities through phishing emails with Ukrainian-language lures about border crossing appeals.
Information security
fromComputerworld
2 months ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
fromThe Hacker News
2 months ago

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

It launches a headless Chrome instance - a browser that operates without a visible window - inside a Docker container, loads the brand's real website, and acts as a reverse proxy between the target and the legitimate site. Recipients are served genuine page content directly through the attacker's infrastructure, ensuring the phishing page is never out of date.
Information security
Privacy technologies
fromTechzine Global
2 months ago

Fake Google Security page hijacks browser as proxy for attackers

Attackers use fake Google security notifications to install malicious Progressive Web Apps that steal one-time passwords, crypto wallet addresses, location data, and intercept SMS codes through social engineering and legitimate browser APIs.
fromZDNET
2 months ago

Phone acting weird? 5 red flags that could point to hackers

Your mobile phone is a treasure trove of personal and confidential information. That's why it's a prime target for hackers who want to compromise or steal your data. Through malicious apps and websites, phishing attacks, and other threats, an attacker can gain control of your device through spyware. But how can you tell if your phone has been hacked or tapped?
Information security
fromZDNET
2 months ago

Half of all cyberattacks start in your browser: 10 essential tips for staying safe

Web browsers are among the top targets for today's cybercriminals, playing a role in nearly half of all security incidents, new research reveals. According to Palo Alto Networks' 2026 Global Incident Response report, an analysis of 750 major cyber incidents recorded last year across 50 countries found that, in total, 48% of cybercrime events involved browser activity. Individuals trying to connect to the web, including business employees, are exposed to cyberthreats on a daily basis.
Information security
Information security
fromCointelegraph
2 months ago

Why Address Poisoning Works Without Stealing Private Keys

Address poisoning steals funds by manipulating transaction history and exploiting users copying lookalike addresses, not by stealing private keys.
fromDataBreaches.Net
2 months ago

Nigerian Man Sentenced to Eight Years in Prison for Computer Intrusion and Theft - DataBreaches.Net

Matthew A. Akande, 37, was sentenced by U.S. District Court Judge Indira Talwani to eight years in prison, to be followed by three years of supervised release. Akande was also ordered to pay $1,393,230 in restitution. Akande was arrested in October 2024 at Heathrow Airport in the United Kingdom at the request of the United States and extradited to the United States on March 5, 2025.
fromThe Hacker News
2 months ago

Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware

This week's recap shows how small gaps are turning into big entry points. Not always through new exploits, often through tools, add-ons, cloud setups, or workflows that people already trust and rarely question. Another signal: attackers are mixing old and new methods. Legacy botnet tactics, modern cloud abuse, AI assistance, and supply-chain exposure are being used side by side, whichever path gives the easiest foothold.
Tech industry
EU data protection
fromDataBreaches.Net
2 months ago

Guernsey medical practice sanctioned after cyber criminals access patient data through email account - DataBreaches.Net

First Contact Health was sanctioned by the ODPA for insufficient security after a phishing attack exposed confidential patient health data.
Information security
fromThe Hacker News
2 months ago

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

A Russian-affiliated actor uses CANFAIL malware and LLM-generated phishing lures to target Ukrainian defense, energy, aerospace, and related organizations.
Information security
fromTechzine Global
2 months ago

Major hack of Dutch telco Odido was a classic case of social engineering

Phishing and phone-based social engineering allowed attackers to bypass MFA, access Odido's Salesforce accounts, and scrape up to 6.2 million customer records.
Information security
fromComputerworld
2 months ago

'Dead' Outlook add-in hijacked to phish 4,000 Microsoft Office Store users

Microsoft-signed add-ins can be hijacked via orphaned subdomains, allowing attackers to serve phishing content and gain permissions like reading and modifying user emails.
Information security
fromwww.socialmediatoday.com
2 months ago

Google Says That Scam Tactics Are Evolving Through AI Usage

AI tools dramatically enhance attackers' productivity, enabling more convincing phishing, model-extraction corporate espionage, and nation-state use for technical research and targeted campaigns.
fromThe Hacker News
2 months ago

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as various hacking groups continue to weaponize the tool for accelerating various phases of the cyber attack life cycle, enabling information operations, and even conducting model extraction attacks. "The group used Gemini to synthesize OSINT and profile high-value targets to support campaign planning and reconnaissance,"
Information security
Information security
fromComputerworld
2 months ago

Windows shortcut files targeted by ransomware gang Global Group

Phishing campaigns now weaponize Windows .lnk shortcut files to silently deploy Global Group ransomware via 'Your document' email attachments.
Information security
fromSecuritymagazine
2 months ago

Understanding Breaches Before and After They Happen: What Every Organization Should Know

Most security breaches result from neglected fundamentals—human error, unpatched systems, weak authentication, and poor network segmentation—rather than advanced, novel exploits.
fromwww.theguardian.com
2 months ago

Don't lose your 12,739 points!' The text scams cashing in on bogus rewards

EE said the messages were sent via RCS, a more advanced type of messaging than SMS, and it is unable to block them (unlike SMS, which it can). EE said it was working with Apple and Google on the problem. Vodafone said its customers were mostly not receiving the texts (labelled as coming from Vodafone) because RCS is not enabled by the carrier on iPhones. However, people on other networks are receiving them.
Mobile UX
Information security
fromTechRepublic
8 months ago

Workday Hit by Social Engineering Attack, Third-Party Data Exposed

A social engineering attack gave attackers access to a third-party CRM, exposing business contact details while Workday's customer tenants and stored data remained uncompromised.
Apple
fromMail Online
2 months ago

Warning to iPhone users over email scam stealing bank details

Fraudulent emails impersonate Apple Support to steal Apple IDs, verification codes, and payment information by urging immediate action on fake Apple Pay charges.
[ Load more ]