#email-spam-campaigns

[ follow ]
Privacy technologies
fromThe Local Germany
5 hours ago

As phishing attacks hit Germany - how secure is Signal messenging app?

Signal, a secure messaging app, faces phishing attacks linked to Russian groups, raising concerns about its security despite its end-to-end encryption.
#cybersecurity
Careers
fromEntrepreneur
1 day ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Privacy technologies
fromMail Online
2 days ago

How to create secure passwords - it might be time to switch to passkey

Using unique passwords and transitioning to passkeys enhances online security and reduces the risk of cyber threats.
Privacy professionals
fromThe Hacker News
2 days ago

NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

A Chinese national impersonated U.S. researchers to obtain sensitive information from NASA and other entities, violating export control laws.
Careers
fromEntrepreneur
1 day ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Information security
fromComputerWeekly.com
2 days ago

BT has now blocked over a billion clicks to malicious websites, says NCSC | Computer Weekly

BT and EE have blocked over a billion clicks to malicious websites using intelligence from the UK's National Cyber Security Centre.
Privacy technologies
fromMail Online
2 days ago

How to create secure passwords - it might be time to switch to passkey

Using unique passwords and transitioning to passkeys enhances online security and reduces the risk of cyber threats.
Privacy professionals
fromThe Hacker News
2 days ago

NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

A Chinese national impersonated U.S. researchers to obtain sensitive information from NASA and other entities, violating export control laws.
#email-marketing
fromPractical Ecommerce
4 hours ago
Deliverability

Email at 55 Is Vital for Marketers

Email remains a vital owned media channel for ecommerce, providing direct connections between businesses and customers.
Deliverability
fromLitmus
1 week ago

How MBPs Think About Email: Google, Yahoo, & Microsoft

Mailbox providers prioritize email relevance and engagement, requiring authentication and leveraging AI to enhance user experience.
Deliverability
fromLitmus
1 week ago

How MBPs Think About Email: Google, Yahoo, & Microsoft

Mailbox providers prioritize email relevance and engagement, requiring authentication and leveraging AI to enhance user experience.
Typography
fromFuturism
2 hours ago

New Browser Plugin Adds Typos to Your AI-Generated Emails to Make Them Look Real

Large language model tools have led to the creation of a plugin that intentionally adds typos to emails to mimic human writing.
Startup companies
fromFuturism
1 day ago

Your Former Employer Is Selling Your Slacks and Emails to Train AI

Founders of defunct startups are monetizing their digital remains, such as Slack messages and emails, through a growing ecosystem of buyers and middlemen.
Online marketing
fromForbes
15 hours ago

Meta Will Run Your Entire Ad Campaign With AI. Should You Let It

Meta's Advantage+ suite automates AI ad campaigns, simplifying the process for small businesses and improving cost efficiency.
#meta
Media industry
fromMashable
1 day ago

Meta accused of profiting from scam ads in class-action lawsuit

Meta faces a class-action lawsuit for allegedly profiting from scam advertisements on Facebook while claiming to combat them.
Privacy professionals
fromFOX 5 DC
4 days ago

Meta profited billions from scam ads while misleading users: lawsuit

Meta is accused of profiting from scam ads on Facebook and Instagram while misleading users about its efforts to combat them.
Privacy professionals
fromEngadget
4 days ago

Meta has misled users about scam ads on Facebook and Instagram, lawsuit says

Meta is being sued for allegedly prioritizing profits over user safety by allowing scam ads on its platforms.
Privacy professionals
fromWIRED
5 days ago

Meta Is Sued Over Scam Ads on Facebook and Instagram

Consumer Federation of America sues Meta for allowing fraudulent ads on its platforms, violating DC consumer protection laws.
Media industry
fromMashable
1 day ago

Meta accused of profiting from scam ads in class-action lawsuit

Meta faces a class-action lawsuit for allegedly profiting from scam advertisements on Facebook while claiming to combat them.
Privacy professionals
fromFOX 5 DC
4 days ago

Meta profited billions from scam ads while misleading users: lawsuit

Meta is accused of profiting from scam ads on Facebook and Instagram while misleading users about its efforts to combat them.
Privacy professionals
fromEngadget
4 days ago

Meta has misled users about scam ads on Facebook and Instagram, lawsuit says

Meta is being sued for allegedly prioritizing profits over user safety by allowing scam ads on its platforms.
Privacy professionals
fromWIRED
5 days ago

Meta Is Sued Over Scam Ads on Facebook and Instagram

Consumer Federation of America sues Meta for allowing fraudulent ads on its platforms, violating DC consumer protection laws.
Marketing tech
fromThe Conversation
2 days ago

You probably wouldn't notice if an AI chatbot slipped ads into its responses

AI chatbots are being used for covert advertising, influencing user choices without their awareness.
fromwww.cbc.ca
2 days ago

Police arrest 3 people in cybercrime investigation, seize SMS blasters' used to defraud victims | CBC News

The investigation began in November 2025, when police were alerted to a suspected SMS blaster operating in downtown Toronto. Police later determined that the blaster was operating out of a car, which allowed it to move around the city and Greater Toronto Area.
Canada news
#artificial-intelligence
Artificial intelligence
fromInfoQ
2 days ago

Deepfakes, Disinformation, and AI Content Are Taking Over the Internet

AI has become ubiquitous in society, influencing various industries and products, but there are concerns about its overuse and effectiveness.
Artificial intelligence
fromWIRED
3 days ago

5 AI Models Tried to Scam Me. Some of Them Were Scary Good

Artificial intelligence is increasingly capable of executing sophisticated social engineering attacks, as demonstrated by the DeepSeek-V3 model.
Artificial intelligence
fromInfoQ
2 days ago

Deepfakes, Disinformation, and AI Content Are Taking Over the Internet

AI has become ubiquitous in society, influencing various industries and products, but there are concerns about its overuse and effectiveness.
Artificial intelligence
fromWIRED
3 days ago

5 AI Models Tried to Scam Me. Some of Them Were Scary Good

Artificial intelligence is increasingly capable of executing sophisticated social engineering attacks, as demonstrated by the DeepSeek-V3 model.
fromMilitary.com
2 days ago

AI MAGA Influencer, Service Member Scams Fuel 'Digital Stolen Valor' Rise

The administrators behind Military Phony described 'digital stolen valor' as the online equivalent of wearing medals you didn't earn, using exaggerated or fabricated credentials to gain respect, sympathy or opportunity that would otherwise belong to someone else.
Social media marketing
Digital life
fromFast Company
3 days ago

AI sycophancy could be more insidious than social media filter bubbles

AI chatbots may use flattery to enhance user engagement, similar to social media algorithms, leading to potential distortions in judgment.
fromAfrica Check
5 days ago

Imposter Facebook page uses Watu branding to lure users into paying for non-existent goods

The page advertises a variety of products, including smartphones, audio systems, cookers, and TVs, requiring a small deposit from interested customers.
Fundraising
#ransomware
Law
fromTheregister
5 days ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
Law
fromTheregister
5 days ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
Online marketing
fromIndependent
1 day ago

Why your AI assistant is suddenly selling to you

Sponsored chats are transforming digital advertising by integrating promotions into conversations with large language models.
Deliverability
fromWordtothewise
2 days ago

DKIM2: What it means for the future of email

DKIM2 is a new email authentication protocol in development, improving security and reliability over DKIM and addressing issues from previous methods.
Media industry
fromwww.independent.co.uk
2 days ago

Boy, 13, among rising number of males blackmailed in sextortion scam

Sextortion scams predominantly target young men, with nearly half of victims in their twenties, highlighting a significant vulnerability across various age groups.
Marketing tech
fromForbes
3 days ago

How To Keep Growing Despite Major Digital Ad Changes

Businesses must adapt their ad strategies to navigate changing restrictions and maintain growth despite reduced flexibility.
Careers
fromwww.theguardian.com
5 days ago

AI job scams are booming and I was fooled by one. Here is how to avoid them

A seemingly perfect job opportunity turned out to be a scam, revealing red flags throughout the recruitment process.
fromNonprofit Tech for Good
5 days ago

7 Steps to Turn Your SMS Program into a Storytelling Engine

SMS is one of the most underused answers to that problem. Texts get opened, they feel personal, and the barrier to respond is lower than almost any other channel. When you ask a question, people answer. And what comes back can become some of your most compelling content.
Fundraising
Deliverability
fromThedrum
1 day ago

How a Modern Twist on Direct Mail Can Better Engage Customers

Direct mail enhances digital advertising effectiveness and can be optimized through technology for better audience engagement.
Information security
fromIT Brew
2 days ago

Asking around: When does ransomware threat intelligence become noise?

Effective threat intelligence requires filtering information relevant to specific market segments to avoid overwhelming alerts.
#generative-ai
Marketing tech
fromSFGATE
1 week ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech giants like Google to enhance their defenses against these threats.
Marketing tech
fromAP News
1 week ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech companies like Google to enhance their defenses against malicious ads.
Marketing tech
fromSFGATE
1 week ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech giants like Google to enhance their defenses against these threats.
Marketing tech
fromAP News
1 week ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech companies like Google to enhance their defenses against malicious ads.
Information security
fromZDNET
3 days ago

The shadowy SIM farms behind those incessant scam texts - and how to stay safe

SIM farms are used by cybercriminals for financial fraud, spam, phishing, and online product scalping.
fromTechCrunch
2 days ago

Another spyware maker caught distributing fake Android snooping apps | TechCrunch

Morpheus, a new malware identified by Osservatorio Nessuno, masquerades as a phone updating app and is capable of stealing a broad range of data from an intended target's device.
Privacy professionals
Deliverability
fromSecurityWeek
3 days ago

The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface

Email attackers now exploit behavioral weaknesses, using tailored tactics that blend into trusted relationships and workflows, making detection more challenging.
#malware
Information security
fromTechRepublic
1 week ago

New Phishing Attack Turns n8n Into On-Demand Malware Machine

Attackers are exploiting n8n workflows to deliver malware while evading detection and blending into normal business activities.
Information security
fromTheregister
2 days ago

Researchers find sabotage malware that may predate Stuxnet

Malware named fast16 aims to sabotage engineering and physics simulation software, predating Stuxnet and targeting high-precision tools.
Information security
fromTechRepublic
3 days ago

Fake Google Antigravity Installer Can Steal Accounts in Minutes

A fake Google Antigravity download exposes user accounts to compromise by delivering malware alongside the legitimate application.
Information security
fromTechRepublic
1 week ago

New Phishing Attack Turns n8n Into On-Demand Malware Machine

Attackers are exploiting n8n workflows to deliver malware while evading detection and blending into normal business activities.
Marketing tech
fromSan Diego Union-Tribune
1 week ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech companies to enhance their defenses against these threats.
#phishing
Information security
fromTheregister
2 weeks ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
fromSecuritymagazine
3 weeks ago
Information security

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
Deliverability
fromTechRepublic
3 days ago

New Apple Phishing Scam Uses Fake $899 iPhone Purchase Alert

A phishing scam mimics an Apple security alert to trick users into calling a fake support number and potentially compromising their accounts.
Privacy technologies
fromTechRepublic
1 month ago

Apple Mail's 'Trusted Sender' Label Misused in New Phishing Scheme

Apple Mail's 'trusted sender' label can mislead users, allowing phishing scams to exploit perceived familiarity without verifying sender legitimacy.
Information security
fromTheregister
2 weeks ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
Information security
fromSecuritymagazine
3 weeks ago

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
fromTheregister
2 days ago

Dev targeted by sophisticated job scam

Vujičić noted that he receives daily messages about job offers, with a personal record of eight in one day, indicating the prevalence of recruitment scams targeting crypto professionals.
Information security
Information security
fromSecurityWeek
2 days ago

Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents

Agentic AI is transforming cybersecurity, presenting both opportunities for defenders and risks for attackers, necessitating a strategic response from the industry.
Deliverability
fromenglish.elpais.com
1 week ago

Only 13% of emails are written by people, and more than half end up in the spam folder: This isn't a technical detail; it's a structural change'

Email is increasingly dominated by automated systems, with 87% of traffic generated by them, leading to declining effectiveness and user engagement.
Deliverability
fromZDNET
1 week ago

This simple email trick saves me from annoying marketing spam (and it's free to do)

Using a dedicated shopping email can effectively reduce spam and clutter in your primary inbox.
Information security
fromArs Technica
2 days ago

Now, even ransomware is using post-quantum cryptography

Kyber's use of PQC key-exchange algorithms serves more as a marketing tactic than a practical security measure against imminent quantum threats.
Privacy professionals
fromZDNET
6 days ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
Deliverability
fromZDNET
2 weeks ago

Here's my favorite email trick for cleaning up inbox clutter - automatically

Using email aliases can help manage and organize an overflowing inbox effectively.
#email-deliverability
Deliverability
fromHubspot
2 months ago

How AI improves email deliverability beyond send times

AI email deliverability optimization enhances inbox placement by aligning with mailbox provider metrics like authentication, engagement, and sender reputation.
Deliverability
fromHubspot
2 months ago

How AI improves email deliverability beyond send times

AI email deliverability optimization enhances inbox placement by aligning with mailbox provider metrics like authentication, engagement, and sender reputation.
Deliverability
fromZDNET
2 weeks ago

How a burner email can protect your inbox - setting one up one is easy and free

A burner email address protects against spam and phishing by providing a temporary, disposable option for account creation.
Marketing
fromInc
1 month ago

The 4 Email Tactics Helping Brands Stand Out in a 'Delete, Delete, Delete' Era"

Brands must prioritize mobile-first, visually engaging email designs that encourage sharing on social media rather than focusing solely on open rates.
fromGSMArena.com
1 month ago

Spam campaign impersonating us targets T-Online users in Germany

The spammers are spoofing our email address - this means they are falsely setting GSMArena.com as the sender of the email. Specifically, it looks like the email came from tpjdlgcj@gsmarena.com, but that's not an active account on our server (that random jumble of letters is clearly randomly generated). Instead the emails are coming from a server owned by Microsoft (52.103.140.27) and one owned by Oracle (92.5.13.127), neither of which is part of our infrastructure.
Mobile UX
Marketing tech
fromPhys
1 month ago

Online ad fraud is a feature, not a bug

Online ad fraud significantly undermines digital advertising revenue, consuming over 20% of global ad spend.
#email-fraud
Information security
fromTheregister
6 days ago

Prompt injection proves AI models are gullible like humans

Prompt injection attacks exploit AI systems, similar to phishing, by embedding malicious instructions that the AI executes instead of treating as content.
Privacy technologies
fromZDNET
1 month ago

Is that message spam or real? This Android trick helps you ID the scams

Android's Circle to Search feature uses AI to identify scam messages by analyzing their content and alerting users to potential fraud.
#malvertising
Marketing tech
fromComputerworld
1 month ago

Targeted advertising is also targeting malware

Malvertising has become the primary malware delivery vector globally, surpassing email and direct hacks, with AI enabling rapid distribution of adaptive malware across publishers.
fromMashable
1 month ago
Information security

Hackers use this tool to bypass fraud detection and weaponize Google ads

Marketing tech
fromComputerworld
1 month ago

Targeted advertising is also targeting malware

Malvertising has become the primary malware delivery vector globally, surpassing email and direct hacks, with AI enabling rapid distribution of adaptive malware across publishers.
fromMashable
1 month ago
Information security

Hackers use this tool to bypass fraud detection and weaponize Google ads

Deliverability
fromThe Conversation
1 month ago

Sick of spam marketing texts and emails? This is how to stop them

Australia's Spam Act prohibits unsolicited commercial electronic messages and requires clear unsubscribe options, with violations resulting in significant penalties like Lululemon's A$702,900 fine.
Privacy professionals
fromFast Company
2 months ago

Those unsolicited credit card offers in your mailbox leave you vulnerable. Here's how to get them to stop

Unsolicited mailed credit card offers are legal, generated from credit bureau data, and can create financial and identity vulnerability if handled improperly.
Deliverability
fromLitmus
1 month ago

Google Is Failing Your Perfectly Good DKIM-and Why That's a Good Thing

DKIM verifies email sender authenticity and prevents content tampering, with Google's strict validation protecting against phishing and spoofing while improving email deliverability.
fromLitmus
1 month ago

Help! I'm Suspended for Sender Reputation Data

Sender reputation suspensions often arise from email practices that negatively impact the recipient experience, such as high bounce rates, subscriber complaints, and invalid addresses. These elements collectively shape your sender reputation data and trigger a suspension when they consistently fall below acceptable thresholds.
Deliverability
Information security
fromArs Technica
2 months ago

There's a rash of scam spam coming from a real Microsoft address

The legitimate Microsoft Power BI address no-reply-powerbi@microsoft.com is being abused to send scam emails that prompt victims to call numbers and install remote-access software.
fromZDNET
2 months ago

Missing emails? Exchange Online is tagging legitimate messages as spam - here's what to do

In a service alert spotted by BleepingComputer, Microsoft revealed that the glitch started on February 5 and has been preventing some Exchange Online users from sending and receiving emails. "Some users' legitimate email messages are being marked as phish and quarantined in Exchange Online," Microsoft said in the service alert. "We've determined that the URLs associated with these email messages are incorrectly marked as phish and quarantined in Exchange Online due to ever-evolving criteria aimed at identifying suspicious email messages, as spam and phishing techniques have become more sophisticated in avoiding detection."
Information security
Information security
fromTheregister
2 months ago

AI agents can spill secrets via malicious link previews

Messaging app link previews can cause AI agents to leak sensitive data via attacker-controlled URLs automatically, enabling zero-click data exfiltration.
[ Load more ]