Click any tag below to further narrow down your results
Links
Researchers reveal how service providers fuel the pig butchering scams, enabling criminal networks to launch operations with minimal effort. These services supply tools for social engineering, money laundering, and managing victims, creating a scalable online fraud economy.
A cybersecurity firm found over 2,000 fake online stores set up to scam shoppers during major sales events like Black Friday and Cyber Monday. These sites mimic legitimate brands and use tactics like fake countdown timers to trick customers into giving away personal and financial information. Shoppers should be cautious of deals that seem too good to be true and verify offers on official brand websites.
Eric Moret recounts a near miss with a sophisticated phishing attempt that exploited Apple’s support system. He details how scammers manipulated legitimate security protocols to gain access to his account, highlighting the psychological tactics used to deceive him.
This article discusses a phishing scam where attackers impersonate recruiters to invite job seekers to fake interviews. The communication often includes suspicious links and requests for software installations, which can lead to malware infections. It emphasizes the importance of verifying the sender and maintaining updated security measures.
Visa and Mastercard's recent reports highlight the growing sophistication of fraud schemes, particularly as the holiday shopping season approaches. They detail how criminals are using advanced technology to create fake e-commerce sites and exploit consumer behavior, urging vigilance among shoppers and merchants to combat these risks.
The blog post discusses a sophisticated phishing scam that impersonates Google Careers, highlighting its various tactics and the challenges it presents in identifying and preventing such attacks. It emphasizes the need for heightened awareness and security measures among users to protect their credentials from these evolving scams.
WhatsApp has deactivated 6.8 million accounts that were linked to criminal scam centers worldwide, as reported by its parent company Meta. The crackdown aimed to disrupt these scams, particularly those originating from Cambodia, and was conducted in collaboration with OpenAI.
Hazy Hawk, a threat actor, is exploiting abandoned DNS CNAME records to hijack trusted subdomains of various organizations, including government and educational institutions, to distribute scams and malicious content. By registering new cloud resources with names matching the abandoned records, they create numerous fraudulent URLs that deceive users into clicking on them, leading to tech support scams and phishing attempts. The operation highlights the risks associated with neglected DNS configurations and the need for organizations to properly manage their domain records.
Convera warns that the rise of AI-driven scams poses significant risks to businesses, particularly in the financial sector. Bridget Pruzin emphasizes the importance of recognizing fraud indicators, such as voice cloning and urgent requests for sensitive information, and advocates for proactive education and collaboration to combat these sophisticated threats.
Scammers are targeting LastPass users by sending deceptive messages claiming that the users are deceased in an attempt to extract their login credentials. These phishing attempts exploit users' emotions and trust to gain unauthorized access to their accounts. Users are advised to remain vigilant and report any suspicious communications.
A recent phishing scam has been exploiting Google's email system by using "no-reply" addresses to trick users into revealing sensitive information. The scam takes advantage of legitimate-looking emails to bypass security measures, highlighting the need for better user awareness and email authentication practices. Google has taken steps to improve its security protocols to combat such fraudulent activities.
North Korean IT workers are reportedly engaging in AI recruitment scams to exploit global job markets, using sophisticated techniques to lure potential victims. These scams may be part of a broader strategy to generate revenue for the North Korean regime amid international sanctions. Authorities are concerned about the implications of such operations on cybersecurity and financial fraud.
Takuya shares a frightening experience of receiving a phishing email disguised as a user support inquiry. The email led him to a malicious link that prompted him to execute a dangerous command in his terminal, highlighting the increasing sophistication of phishing attempts and the importance of staying vigilant against such threats.