#email-fraud

[ follow ]
Information security
fromIT Brew
13 hours ago

Asking around: When does ransomware threat intelligence become noise?

Effective threat intelligence requires filtering information relevant to specific market segments to avoid overwhelming alerts.
#remote-work
Remote teams
fromFast Company
18 hours ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require careful management.
Remote teams
fromFast Company
18 hours ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
18 hours ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
18 hours ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require careful management.
Remote teams
fromFast Company
18 hours ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
18 hours ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Deliverability
fromSecurityWeek
22 hours ago

The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface

Email attackers now exploit behavioral weaknesses, using tailored tactics that blend into trusted relationships and workflows, making detection more challenging.
#artificial-intelligence
Artificial intelligence
fromWIRED
1 day ago

5 AI Models Tried to Scam Me. Some of Them Were Scary Good

Artificial intelligence is increasingly capable of executing sophisticated social engineering attacks, as demonstrated by the DeepSeek-V3 model.
Artificial intelligence
fromWIRED
1 day ago

5 AI Models Tried to Scam Me. Some of Them Were Scary Good

Artificial intelligence is increasingly capable of executing sophisticated social engineering attacks, as demonstrated by the DeepSeek-V3 model.
EU data protection
fromwww.theguardian.com
21 hours ago

Some Interrail travellers told to cancel passports as hacked data posted online

Holidaymakers in Europe must replace passports after personal data was hacked and sold on the dark web, causing stress and financial burden.
#cybercrime
fromwww.cbc.ca
15 hours ago
Canada news

Police arrest 3 people in cybercrime investigation, seize SMS blasters' used to defraud victims | CBC News

Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Canada news
fromwww.cbc.ca
15 hours ago

Police arrest 3 people in cybercrime investigation, seize SMS blasters' used to defraud victims | CBC News

Three individuals were arrested in Toronto for using SMS blasters to defraud victims through fraudulent text messages.
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Media industry
fromwww.independent.co.uk
10 hours ago

Boy, 13, among rising number of males blackmailed in sextortion scam

Sextortion scams predominantly target young men, with nearly half of victims in their twenties, highlighting a significant vulnerability across various age groups.
Privacy professionals
fromFast Company
21 hours ago

Meta tracking employee keystrokes to train AI is probably legal. Experts say that doesn't make it ethical

Meta Platforms is implementing software to track employee computer usage to train AI models, raising privacy concerns amid potential layoffs.
Privacy technologies
fromTheregister
17 hours ago

Proton CEO: Age checks turn internet into ID checkpoint

Age verification risks transforming the internet into a system requiring identification for all users, compromising anonymity and security.
Digital life
fromThe New Yorker
1 day ago

The Anguish of Data Loss

Data preservation is crucial, yet digital devices are fragile and often treated carelessly, leading to significant loss when data is not backed up.
#data-breach
France news
fromEngadget
1 day ago

France's national agency for managing IDs and passports suffered a data breach last week

France Titres confirmed a security breach exposing personal data, including names and contact information, with potential for phishing attacks.
France news
fromSecuritymagazine
2 days ago

Hackers Claim 19M Records Stolen From French Government Agency

A security incident at ANTS may have compromised citizen data, including personal information of 19 million records.
Information security
fromTechCrunch
18 hours ago

Vercel says some of its customers' data was stolen prior to its recent hack | TechCrunch

Vercel experienced a data breach affecting customer accounts, with evidence of prior compromises suggesting broader security implications.
France news
fromEngadget
1 day ago

France's national agency for managing IDs and passports suffered a data breach last week

France Titres confirmed a security breach exposing personal data, including names and contact information, with potential for phishing attacks.
France news
fromSecuritymagazine
2 days ago

Hackers Claim 19M Records Stolen From French Government Agency

A security incident at ANTS may have compromised citizen data, including personal information of 19 million records.
Information security
fromTechCrunch
18 hours ago

Vercel says some of its customers' data was stolen prior to its recent hack | TechCrunch

Vercel experienced a data breach affecting customer accounts, with evidence of prior compromises suggesting broader security implications.
#ransomware
Healthcare
fromNextgov.com
2 days ago

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Ransomware actors targeting critical infrastructure may be designated as terrorists, allowing for expanded legal actions against them.
Law
fromTheregister
2 days ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
Healthcare
fromNextgov.com
2 days ago

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Ransomware actors targeting critical infrastructure may be designated as terrorists, allowing for expanded legal actions against them.
Law
fromTheregister
2 days ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
fromAfrica Check
3 days ago

Imposter Facebook page uses Watu branding to lure users into paying for non-existent goods

The page advertises a variety of products, including smartphones, audio systems, cookers, and TVs, requiring a small deposit from interested customers.
Fundraising
#cybersecurity
Information security
fromTechRepublic
1 day ago

Hackers Impersonate IT Help Desk on Microsoft Teams to Gain Access, Steal Data

Hackers are increasingly using social engineering on Microsoft Teams to gain unauthorized access by impersonating IT support.
Information security
fromTheregister
1 day ago

Sharing isn't caring if it's an admin password: Pwned

Prioritizing convenience over security can lead to significant data loss, as demonstrated by a client using a common password and sharing it publicly.
Information security
fromThe Hacker News
14 hours ago

UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware

UNC6692 uses social engineering via Microsoft Teams to deploy malware, targeting senior employees with email spam and impersonation tactics.
DevOps
fromSecuritymagazine
2 days ago

The Security Metric That's Failing You

Measuring patch rates does not equate to a secure environment; real risks often lie in misconfigurations and outdated permissions.
Information security
fromTechRepublic
1 day ago

Hackers Impersonate IT Help Desk on Microsoft Teams to Gain Access, Steal Data

Hackers are increasingly using social engineering on Microsoft Teams to gain unauthorized access by impersonating IT support.
Privacy technologies
fromTheregister
1 day ago

NCSC: Passkeys now good enough to be the default standard

The NCSC endorses passkeys as the default authentication standard, urging consumers to abandon passwords for enhanced security.
Information security
fromTheregister
1 day ago

Sharing isn't caring if it's an admin password: Pwned

Prioritizing convenience over security can lead to significant data loss, as demonstrated by a client using a common password and sharing it publicly.
Information security
fromThe Hacker News
14 hours ago

UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware

UNC6692 uses social engineering via Microsoft Teams to deploy malware, targeting senior employees with email spam and impersonation tactics.
fromCointelegraph
3 days ago

Fake Police Raid Scam Forces Victim to Send $1M in Bitcoin

The French case illustrates how attackers used a fake police raid and violence to force a Bitcoin transfer worth $1 million, bypassing encryption entirely by compelling the victim to authorize the transaction.
Cryptocurrency
Careers
fromwww.theguardian.com
3 days ago

AI job scams are booming and I was fooled by one. Here is how to avoid them

A seemingly perfect job opportunity turned out to be a scam, revealing red flags throughout the recruitment process.
Marketing tech
fromSFGATE
1 week ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech giants like Google to enhance their defenses against these threats.
Deliverability
fromWordtothewise
13 hours ago

DKIM2: What it means for the future of email

DKIM2 is a new email authentication protocol in development, improving security and reliability over DKIM and addressing issues from previous methods.
#apple
Apple
fromThe Hacker News
1 day ago

Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case

Apple has released a software update to fix a flaw in iOS and iPadOS that retained deleted notifications on devices.
Apple
fromSecurityWeek
1 day ago

Apple Patches iOS Flaw Allowing Recovery of Deleted Chats

Apple released updates to fix a vulnerability that allowed recovery of deleted messages on iOS and iPadOS devices.
Apple
fromThe Hacker News
1 day ago

Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case

Apple has released a software update to fix a flaw in iOS and iPadOS that retained deleted notifications on devices.
Apple
fromSecurityWeek
1 day ago

Apple Patches iOS Flaw Allowing Recovery of Deleted Chats

Apple released updates to fix a vulnerability that allowed recovery of deleted messages on iOS and iPadOS devices.
Privacy professionals
fromReadWrite
22 hours ago

Caesars sued over 2026 data breach claims

Caesars Entertainment faces a class action lawsuit for failing to protect customer data during a second cyber incident after a previous breach in 2023.
Fundraising
fromIndependent
3 days ago

Company has more than 2m stolen from account following cyber attack

Future Energy Capital Limited lost over €2m due to a cyber attack last October.
fromTheregister
11 hours ago

Dev targeted by sophisticated job scam

Vujičić noted that he receives daily messages about job offers, with a personal record of eight in one day, indicating the prevalence of recruitment scams targeting crypto professionals.
Information security
#phishing
Information security
fromTheregister
2 weeks ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
fromSecuritymagazine
3 weeks ago
Information security

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
fromThe Hacker News
1 month ago
Information security

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Deliverability
fromTechRepublic
1 day ago

New Apple Phishing Scam Uses Fake $899 iPhone Purchase Alert

A phishing scam mimics an Apple security alert to trick users into calling a fake support number and potentially compromising their accounts.
Information security
fromSecurityWeek
5 days ago

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

Threat actors have shifted to new phishing platforms after Tycoon 2FA's disruption, reusing its tools and increasing overall phishing attacks.
Information security
fromTheregister
2 weeks ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
Information security
fromSecuritymagazine
3 weeks ago

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
Information security
fromThe Hacker News
1 month ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Privacy professionals
fromwww.theguardian.com
1 day ago

Criminal gangs profiting as child sexual abuse websites double, experts say

The number of commercial child sexual abuse websites has doubled in a year, highlighting a significant increase in online exploitation by criminal gangs.
Information security
fromArs Technica
12 hours ago

Now, even ransomware is using post-quantum cryptography

Kyber's use of PQC key-exchange algorithms serves more as a marketing tactic than a practical security measure against imminent quantum threats.
#privacy
Privacy professionals
fromSecuritymagazine
2 days ago

The Privacy-Security Partnership: How We Bend Risk in a Resource Crunch

Fewer privacy practitioners feel confident in meeting laws, while resource shortages and compliance challenges increase stress in the field.
Privacy technologies
fromComputerWeekly.com
6 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Privacy professionals
fromSecuritymagazine
2 days ago

The Privacy-Security Partnership: How We Bend Risk in a Resource Crunch

Fewer privacy practitioners feel confident in meeting laws, while resource shortages and compliance challenges increase stress in the field.
Privacy technologies
fromComputerWeekly.com
6 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Information security
fromZDNET
1 day ago

The shadowy SIM farms behind those incessant scam texts - and how to stay safe

SIM farms are used by cybercriminals for financial fraud, spam, phishing, and online product scalping.
fromArs Technica
1 week ago

Your tech support company runs scams. Stop-or disguise with more fraud?

Tech Live Connect processed fraudulent charges using real customer data, including names and addresses, to make the charges appear legitimate and maintain a low chargeback ratio.
Privacy professionals
Cryptocurrency
fromCointelegraph
1 month ago

How a 'Wrong Number' Message Turned Into a $3.4M Crypto Scam

This $3.4 million scam illustrates the rise of social engineering in crypto fraud, focusing on emotional manipulation over technical exploits.
Information security
fromThe Hacker News
1 hour ago

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

A high-severity SSRF vulnerability in LMDeploy is actively exploited, allowing attackers to access sensitive data and internal networks.
#malware
Information security
fromTechRepublic
6 days ago

New Phishing Attack Turns n8n Into On-Demand Malware Machine

Attackers are exploiting n8n workflows to deliver malware while evading detection and blending into normal business activities.
Information security
fromTechRepublic
1 day ago

Fake Google Antigravity Installer Can Steal Accounts in Minutes

A fake Google Antigravity download exposes user accounts to compromise by delivering malware alongside the legitimate application.
Information security
fromTheregister
2 hours ago

Researchers find sabotage malware that may predate Stuxnet

Malware named fast16 aims to sabotage engineering and physics simulation software, predating Stuxnet and targeting high-precision tools.
Information security
fromTechRepublic
6 days ago

New Phishing Attack Turns n8n Into On-Demand Malware Machine

Attackers are exploiting n8n workflows to deliver malware while evading detection and blending into normal business activities.
Information security
fromSecuritymagazine
2 days ago

Unauthorized Users Accessed Claude Mythos, New Reports Suggest

Unauthorized access to Anthropic's AI model, Claude Mythos Preview, raises security concerns among experts due to its ability to identify digital vulnerabilities.
Information security
fromFast Company
1 day ago

1Password sees AI as both threat and tool

AI presents both risks and opportunities for password management, requiring firms to balance security with the potential for careless app development.
#ai
Information security
fromHarvard Gazette
1 day ago

Got personal financial, medical data you'd like to keep private? Good luck.Got personal financial, medical data you'd like to keep private? Good luck. - Harvard Gazette

New AI models may increase the risk of cybercriminals breaching secure systems, exposing personal data.
Information security
fromFast Company
1 day ago

Brace yourself for a flood of patches in all of your tech gadgets

Mythos, Anthropic's AI model, identifies software vulnerabilities, prompting urgent updates to prevent exploitation by hackers.
Information security
fromSecurityWeek
23 hours ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
Information security
fromHarvard Gazette
1 day ago

Got personal financial, medical data you'd like to keep private? Good luck.Got personal financial, medical data you'd like to keep private? Good luck. - Harvard Gazette

New AI models may increase the risk of cybercriminals breaching secure systems, exposing personal data.
Information security
fromFast Company
1 day ago

Brace yourself for a flood of patches in all of your tech gadgets

Mythos, Anthropic's AI model, identifies software vulnerabilities, prompting urgent updates to prevent exploitation by hackers.
Information security
fromThe Hacker News
23 hours ago

Vercel Finds More Compromised Accounts in Context.ai-Linked Breach

Vercel identified additional compromised customer accounts linked to a security incident involving unauthorized access to its internal systems.
fromSecuritymagazine
1 day ago

Operationally Ineffective: Putting CVEs in a Chokehold with Privilege Disruption

A Common Vulnerability Exposure (CVE) that cannot reach the privilege plane is operationally ineffective - even at a CVSS Score of 10. This should be a core philosophy that is embedded into the fabric of software engineering.
Information security
#chargebacks
Information security
fromInfoWorld
19 hours ago

Offer customers passkeys by default, UK's NCSC tells enterprises

Passkeys are recommended as the primary authentication method due to their security against phishing and credential reuse.
Information security
fromTechRepublic
1 day ago

Malicious TikTok Downloader Extensions Quietly Compromised 130K Users

Browser extensions disguised as TikTok video downloaders are compromising user data, highlighting vulnerabilities in enterprise security.
Information security
fromWIRED
1 day ago

AI Tools Are Helping Mediocre North Korean Hackers Steal Millions

AI tools have enabled unskilled hackers to execute sophisticated cybercrime operations, resulting in significant financial theft.
Privacy professionals
fromComputerworld
1 month ago

Cyber criminals too are working from home... your home

The FBI warns that cybercriminals use residential proxies to mask illegal activities by hijacking IoT devices, smartphones, and routers, threatening both consumers and enterprises, particularly older devices.
fromEngadget
2 days ago

Anthropic is investigating 'unauthorized access' of its Mythos cybersecurity tool

We're investigating a report claiming unauthorized access to Claude Mythos Previous through one of our third-party vendor environments.
Information security
Information security
fromTechzine Global
2 days ago

As Mythos fixes Mozilla flaws, unauthorized access spells disaster

Firefox's Claude Mythos Preview addresses 271 vulnerabilities, but unauthorized access raises concerns about potential misuse by threat actors.
Information security
fromTheregister
3 days ago

Adaptavist Group breach: Ransomware crew claims mega-haul

Adaptavist Group is investigating a security breach involving stolen credentials, while a ransomware group claims to have accessed extensive data.
Information security
fromThe Hacker News
2 weeks ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Information security
fromSecurityWeek
3 weeks ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
Information security
fromTechzine Global
1 month ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
fromSecuritymagazine
1 month ago

Targeted Phishing Attack Breaches Biotech Company Data

This phishing attack enabled the threat actor to access 'certain internal IT business applications.' The malicious actor gained unauthorized entry by compromising an employee's access to the organization's internal network for business administration.
Information security
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
fromPCWorld
1 month ago

Phishing scammers weaponize ICE ragebait

The email seen by at least some customers of the Emma email platform was a phishing scam. Hackers hoped to inspire instant panic with the words, 'As part of our commitment to supporting U.S. Immigration and Customs Enforcement (ICE), we will be adding a Support ICE donation button to the footer of every email sent through our platform.'
Information security
Information security
fromArs Technica
2 months ago

There's a rash of scam spam coming from a real Microsoft address

The legitimate Microsoft Power BI address no-reply-powerbi@microsoft.com is being abused to send scam emails that prompt victims to call numbers and install remote-access software.
[ Load more ]