#online-fraud

[ follow ]
#cybersecurity
fromTechCrunch
4 hours ago
Privacy professionals

Unauthorized group has gained access to Anthropic's exclusive cyber tool Mythos, report claims | TechCrunch

Information security
fromTechRepublic
1 day ago

2026's Breach List So Far: FBI Hacked, 1B Androids at Risk, 270M iPhones Vulnerable

2026 has seen significant cyber threats, including a major FBI hack and the discovery of the DarkSword iPhone exploit framework.
Information security
fromTheregister
15 hours ago

AI-pwned: Vercel breach traced to stolen employee creds

Vercel's CEO suspects AI aided attackers in a breach that exploited a compromised employee account and non-sensitive environment variables.
France news
fromThe Local France
13 hours ago

Warning over cyber-attack on French government's ANTS platform

Hackers accessed personal details of users on the French government's ANTS platform, prompting warnings about potential phishing scams.
Privacy professionals
fromTechCrunch
4 hours ago

Unauthorized group has gained access to Anthropic's exclusive cyber tool Mythos, report claims | TechCrunch

Unauthorized users accessed Mythos, a cybersecurity tool by Anthropic, through a third-party vendor, raising concerns about its potential misuse.
Information security
fromTechRepublic
1 day ago

2026's Breach List So Far: FBI Hacked, 1B Androids at Risk, 270M iPhones Vulnerable

2026 has seen significant cyber threats, including a major FBI hack and the discovery of the DarkSword iPhone exploit framework.
Information security
fromTheregister
15 hours ago

AI-pwned: Vercel breach traced to stolen employee creds

Vercel's CEO suspects AI aided attackers in a breach that exploited a compromised employee account and non-sensitive environment variables.
#ransomware
Healthcare
fromNextgov.com
13 hours ago

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Ransomware actors targeting critical infrastructure may be designated as terrorists, allowing for expanded legal actions against them.
Law
fromTheregister
13 hours ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
Law
fromThe Hacker News
12 hours ago

Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

A ransomware negotiator pleaded guilty to aiding BlackCat ransomware attacks against U.S. companies in 2023.
Information security
fromThe Hacker News
7 hours ago

SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation

The Gentlemen ransomware group uses SystemBC malware to target over 1,570 victims, employing sophisticated tactics for initial access and lateral movement.
Healthcare
fromNextgov.com
13 hours ago

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Ransomware actors targeting critical infrastructure may be designated as terrorists, allowing for expanded legal actions against them.
Law
fromTheregister
13 hours ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
Law
fromThe Hacker News
12 hours ago

Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

A ransomware negotiator pleaded guilty to aiding BlackCat ransomware attacks against U.S. companies in 2023.
Information security
fromThe Hacker News
7 hours ago

SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation

The Gentlemen ransomware group uses SystemBC malware to target over 1,570 victims, employing sophisticated tactics for initial access and lateral movement.
fromAfrica Check
1 day ago

Imposter Facebook page uses Watu branding to lure users into paying for non-existent goods

The page advertises a variety of products, including smartphones, audio systems, cookers, and TVs, requiring a small deposit from interested customers.
Fundraising
fromCointelegraph
20 hours ago

Fake Police Raid Scam Forces Victim to Send $1M in Bitcoin

The French case illustrates how attackers used a fake police raid and violence to force a Bitcoin transfer worth $1 million, bypassing encryption entirely by compelling the victim to authorize the transaction.
Cryptocurrency
UK politics
fromwww.independent.co.uk
6 hours ago

Iran, Russia and China behind most major cyberattacks on UK, security chief warns

The Independent provides critical journalism on key issues without paywalls, emphasizing the importance of accessible reporting.
Careers
fromwww.theguardian.com
23 hours ago

AI job scams are booming and I was fooled by one. Here is how to avoid them

A seemingly perfect job opportunity turned out to be a scam, revealing red flags throughout the recruitment process.
#ai
Artificial intelligence
fromwww.cbc.ca
11 hours ago

Anthropic's latest AI model is sparking fears from cybersecurity experts and the banking sector. Here's why. | CBC News

Mythos, Anthropic's advanced AI model, poses cybersecurity risks by uncovering vulnerabilities faster than they can be fixed.
Artificial intelligence
fromwww.cbc.ca
11 hours ago

Anthropic's latest AI model is sparking fears from cybersecurity experts and the banking sector. Here's why. | CBC News

Mythos, Anthropic's advanced AI model, poses cybersecurity risks by uncovering vulnerabilities faster than they can be fixed.
Venture
fromSFGATE
10 hours ago

Bitwise CEOs admitted to stealing millions. Their scheme is still unraveling.

CEOs of Bitwise Industries admitted to stealing over $100 million, with an associate facing 20 years for conspiracy to commit wire fraud.
#fraud
Pets
fromMail Online
1 day ago

Fraudsters use AI to try and swindle $2,800 from missing dog's family

Fraudsters used AI to create fake emergency surgery images to scam a family out of $2,800 for their missing dog.
Canada news
fromwww.cbc.ca
4 days ago

7 charged in scheme that used AI tools to defraud Toronto-area stores: police | CBC News

Seven people have been charged in a fraud investigation involving AI tools used to steal login information from retail employees in Toronto.
Pets
fromMail Online
1 day ago

Fraudsters use AI to try and swindle $2,800 from missing dog's family

Fraudsters used AI to create fake emergency surgery images to scam a family out of $2,800 for their missing dog.
Canada news
fromwww.cbc.ca
4 days ago

7 charged in scheme that used AI tools to defraud Toronto-area stores: police | CBC News

Seven people have been charged in a fraud investigation involving AI tools used to steal login information from retail employees in Toronto.
#privacy
Privacy technologies
fromTechRepublic
1 day ago

Chrome Privacy Concerns Rise as Expert Warns of Fingerprinting Risks

Browser fingerprinting poses significant privacy risks in Chrome, with at least thirty techniques currently in use to track users without consent.
fromComputerWeekly.com
4 days ago
Privacy technologies

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Privacy technologies
fromTechRepublic
1 day ago

Chrome Privacy Concerns Rise as Expert Warns of Fingerprinting Risks

Browser fingerprinting poses significant privacy risks in Chrome, with at least thirty techniques currently in use to track users without consent.
Privacy technologies
fromComputerWeekly.com
4 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
fromThe New Yorker
1 day ago

When Your Digital Life Vanishes

A broken phone or corrupted drive can mean the loss of work, evidence, art, or the last traces of the dead. But sometimes data-recovery experts can summon lost files from the void.
Digital life
#generative-ai
Marketing tech
fromSFGATE
5 days ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech giants like Google to enhance their defenses against these threats.
Marketing tech
fromAP News
5 days ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech companies like Google to enhance their defenses against malicious ads.
Marketing tech
fromSFGATE
5 days ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech giants like Google to enhance their defenses against these threats.
Marketing tech
fromAP News
5 days ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech companies like Google to enhance their defenses against malicious ads.
fromwww.housingwire.com
4 days ago

Disconnected systems fueling title, wire fraud risks

Disconnected systems, inconsistent definitions of data, and the manual nature of data movement create ongoing challenges in the title industry, according to FundingShield President Adam Chaudhary.
Real estate
EU data protection
fromSecurityWeek
4 days ago

53 DDoS Domains Taken Down by Law Enforcement

Law enforcement in 21 countries coordinated to disrupt DDoS-for-hire services, resulting in arrests and the takedown of numerous domains.
Fundraising
fromIndependent
1 day ago

Company has more than 2m stolen from account following cyber attack

Future Energy Capital Limited lost over €2m due to a cyber attack last October.
Cryptocurrency
fromnews.bitcoin.com
14 hours ago

Lazarus Group Suspected of Moving $175M in ETH After Arbitrum Freezes $71M From KelpDAO Exploit

Lazarus Group drained 116,500 rsETH from KelpDAO, with significant funds frozen and laundered through various protocols.
#data-breach
Privacy professionals
fromTechRepublic
1 day ago

Amtrak Data Breach Exposes 2.1M Records, Reports Suggest Larger Leak

Amtrak customers face data exposure due to a breach affecting millions of records, including personal and travel-related information.
Healthcare
fromSecurityWeek
16 hours ago

Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000

Three US healthcare organizations reported data breaches affecting nearly 600,000 individuals, with significant incidents in Texas and Illinois.
Privacy professionals
fromTechRepublic
1 day ago

Amtrak Data Breach Exposes 2.1M Records, Reports Suggest Larger Leak

Amtrak customers face data exposure due to a breach affecting millions of records, including personal and travel-related information.
#ai-security
Artificial intelligence
fromTechRepublic
1 day ago

The MCP Disclosure Is the AI Era's 'Open Redirect' Moment

The Model Context Protocol has a design flaw that enables AI supply chain attacks, posing a significant security risk to enterprise AI systems.
Information security
fromTheregister
2 days ago

Prompt injection proves AI models are gullible like humans

Prompt injection attacks exploit AI systems, similar to phishing, by embedding malicious instructions that the AI executes instead of treating as content.
Artificial intelligence
fromTechRepublic
1 day ago

The MCP Disclosure Is the AI Era's 'Open Redirect' Moment

The Model Context Protocol has a design flaw that enables AI supply chain attacks, posing a significant security risk to enterprise AI systems.
Information security
fromTheregister
2 days ago

Prompt injection proves AI models are gullible like humans

Prompt injection attacks exploit AI systems, similar to phishing, by embedding malicious instructions that the AI executes instead of treating as content.
Apple
fromMail Online
1 week ago

Warning to all iPhone users over new scam draining bank accounts

iPhone users are warned about a scam involving fake Apple Pay alerts that drain bank accounts.
Privacy professionals
fromZDNET
1 day ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
#cryptocurrency
Cryptocurrency
fromSecurityWeek
17 hours ago

$290 Million Kelp DAO Crypto Heist Blamed on North Korea

North Korea-linked Lazarus Group executed a $290 million cryptocurrency heist from Kelp DAO using sophisticated attack methods.
Information security
fromSecurityWeek
13 hours ago

Dozens of Malicious Crypto Apps Land in Apple App Store

Over two dozen fake cryptocurrency apps targeting iOS users have been found in the Apple App Store, aimed at stealing recovery phrases and private keys.
Cryptocurrency
fromSecurityWeek
17 hours ago

$290 Million Kelp DAO Crypto Heist Blamed on North Korea

North Korea-linked Lazarus Group executed a $290 million cryptocurrency heist from Kelp DAO using sophisticated attack methods.
Information security
fromSecurityWeek
13 hours ago

Dozens of Malicious Crypto Apps Land in Apple App Store

Over two dozen fake cryptocurrency apps targeting iOS users have been found in the Apple App Store, aimed at stealing recovery phrases and private keys.
Apple
fromTechRepublic
1 week ago

New Apple Scam Hits Millions of iPhone Users Worldwide, Draining Bank Accounts

Apple warns iPhone users about a surge in social engineering scams targeting bank accounts through panic-inducing messages.
fromSecurityWeek
1 day ago

Half of the 6 Million Internet-Facing FTP Servers Lack Encryption

Approximately 6 million internet-accessible systems are using FTP today, and almost half of them do not use encryption, exposing enterprises and end users to avoidable risks.
Privacy professionals
Information security
fromTheregister
19 hours ago

Adaptavist Group breach: Ransomware crew claims mega-haul

Adaptavist Group is investigating a security breach involving stolen credentials, while a ransomware group claims to have accessed extensive data.
fromArs Technica
6 hours ago

Mozilla: Anthropic's Mythos found 271 zero-day vulnerabilities in Firefox 150

Computers were completely incapable of doing this a few months ago, and now they excel at it. We have many years of experience picking apart the work of the world's best security researchers, and Mythos Preview is every bit as capable.
Information security
Cryptocurrency
fromCointelegraph
4 weeks ago

How a 'Wrong Number' Message Turned Into a $3.4M Crypto Scam

This $3.4 million scam illustrates the rise of social engineering in crypto fraud, focusing on emotional manipulation over technical exploits.
Information security
fromSecurityWeek
16 hours ago

Organizations Warned of Exploited Cisco, Kentico, Zimbra Vulnerabilities

CISA expanded its Known Exploited Vulnerabilities catalog with eight new flaws, including high-severity bugs in Cisco and Kentico products.
#phishing
Information security
fromSecurityWeek
3 days ago

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

Threat actors have shifted to new phishing platforms after Tycoon 2FA's disruption, reusing its tools and increasing overall phishing attacks.
Information security
fromSecuritymagazine
3 weeks ago

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
Information security
fromThe Hacker News
4 weeks ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Information security
fromSecurityWeek
3 days ago

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

Threat actors have shifted to new phishing platforms after Tycoon 2FA's disruption, reusing its tools and increasing overall phishing attacks.
Information security
fromSecuritymagazine
3 weeks ago

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
Information security
fromThe Hacker News
4 weeks ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
fromSecurityWeek
1 day ago

Bluesky Disrupted by Sophisticated DDoS Attack

The attack is impacting our application, with users experiencing intermittent interruptions in service for their feeds, notifications, threads and search.
Information security
#email-fraud
Information security
fromTechRepublic
1 day ago

Vercel Confirms Major Security Incident as Hacker Claims $2M Ransom Demand

Vercel confirmed a security incident involving unauthorized access to internal systems, with a threat actor claiming to sell stolen company data.
fromSilicon Canals
2 months ago

I'm a retired Boomer and I just watched my smartest friend lose everything to a scam-here are 9 ways they got to him that could get to anyone - Silicon Canals

Last month, I sat across from one of the brightest people I know as he explained how he'd lost nearly everything to a sophisticated scam. This wasn't some naive teenager or technophobe. This was my friend from university days, a retired executive who'd navigated corporate politics for decades and made shrewd investment decisions his whole life. Watching him piece together how it happened was like watching someone solve a puzzle in reverse.
Psychology
#malware
Information security
fromTechRepublic
4 days ago

New Phishing Attack Turns n8n Into On-Demand Malware Machine

Attackers are exploiting n8n workflows to deliver malware while evading detection and blending into normal business activities.
fromThe Hacker News
5 days ago
Information security

UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

A new malware campaign targeting Ukrainian healthcare institutions has been identified, utilizing deceptive emails to deliver malicious payloads.
Information security
fromTechRepublic
4 days ago

New Phishing Attack Turns n8n Into On-Demand Malware Machine

Attackers are exploiting n8n workflows to deliver malware while evading detection and blending into normal business activities.
Information security
fromThe Hacker News
5 days ago

UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

A new malware campaign targeting Ukrainian healthcare institutions has been identified, utilizing deceptive emails to deliver malicious payloads.
Information security
fromBusiness Matters
5 days ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
#malvertising
Marketing tech
fromComputerworld
1 month ago

Targeted advertising is also targeting malware

Malvertising has become the primary malware delivery vector globally, surpassing email and direct hacks, with AI enabling rapid distribution of adaptive malware across publishers.
fromMashable
1 month ago
Information security

Hackers use this tool to bypass fraud detection and weaponize Google ads

Marketing tech
fromComputerworld
1 month ago

Targeted advertising is also targeting malware

Malvertising has become the primary malware delivery vector globally, surpassing email and direct hacks, with AI enabling rapid distribution of adaptive malware across publishers.
fromMashable
1 month ago
Information security

Hackers use this tool to bypass fraud detection and weaponize Google ads

Information security
fromComputerWeekly.com
4 days ago

North Korean social engineering campaign targets macOS users | Computer Weekly

A North Korean campaign targeting macOS users tricked victims into executing malicious files, leading to credential and data theft.
Privacy professionals
fromComputerworld
1 month ago

Cyber criminals too are working from home... your home

The FBI warns that cybercriminals use residential proxies to mask illegal activities by hijacking IoT devices, smartphones, and routers, threatening both consumers and enterprises, particularly older devices.
#cybercrime
fromTechCrunch
5 days ago
Information security

European police email 75,000 people asking them to stop DDoS attacks | TechCrunch

Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Information security
fromTechCrunch
5 days ago

European police email 75,000 people asking them to stop DDoS attacks | TechCrunch

A global law enforcement operation targeted over 75,000 alleged cybercriminals using DDoS-for-hire services, resulting in arrests and domain takedowns.
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
fromFast Company
1 month ago

Scanning that QR code can leave you vulnerable. Here's how to protect yourself

QR codes are two-dimensional images with glyphs of various sizes that store not just numbers, but text. When scanned, your phone extracts the encoded information and can act on it. For example, QR codes often embed URLs, allowing you to scan, say, a parking meter to launch a webpage where you can pay online.
Privacy technologies
Information security
fromThe Hacker News
6 days ago

n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

Threat actors are weaponizing n8n to conduct phishing campaigns and deliver malicious payloads through automated emails.
Information security
fromTechCrunch
1 week ago

FBI announces takedown of phishing operation that targeted thousands of victims | TechCrunch

The FBI dismantled a global phishing operation, W3LL, targeting over 17,000 victims and facilitating over $20 million in fraud.
Information security
fromThe Hacker News
2 weeks ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Information security
fromSecurityWeek
3 weeks ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
fromElectronic Frontier Foundation
3 months ago

The Worst Data Breaches of 2025-And What You Can Do | EFFector 38.1

We're diving into these data breaches and more with our latest EFFector newsletter. Since 1990, EFFector has been your guide to understanding the intersection of technology, civil liberties, and the law. This latest issue tracks U.S. Immigration and Customs Enforcement's (ICE) surveillance spending spree, explains how hackers are countering ICE's surveillance, and invites you to our free livestream covering online age verification mandates.
Privacy professionals
Information security
fromTechzine Global
1 month ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
Information security
fromSecurityWeek
1 month ago

Security Firm Executive Targeted in Sophisticated Phishing Attack

A C-level executive at Outpost24 was targeted by a sophisticated phishing attack using the Kratos phishing-as-a-service kit that exploited legitimate services like Cisco and Nylas to bypass security defenses.
fromPCWorld
1 month ago

Phishing scammers weaponize ICE ragebait

The email seen by at least some customers of the Emma email platform was a phishing scam. Hackers hoped to inspire instant panic with the words, 'As part of our commitment to supporting U.S. Immigration and Customs Enforcement (ICE), we will be adding a Support ICE donation button to the footer of every email sent through our platform.'
Information security
fromTechzine Global
1 month ago

How phishing service Tycoon 2FA went under

Tycoon 2FA, a Phishing-as-a-Service (PhaaS) platform, enabled thousands of cybercriminals to steal login credentials and session tokens. Even accounts secured with MFA could be compromised via a single email. The service had been active since at least 2023 and quickly grew to become one of the most widely used phishing platforms in the world.
Information security
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
fromZDNET
2 months ago

Half of all cyberattacks start in your browser: 10 essential tips for staying safe

Web browsers are among the top targets for today's cybercriminals, playing a role in nearly half of all security incidents, new research reveals. According to Palo Alto Networks' 2026 Global Incident Response report, an analysis of 750 major cyber incidents recorded last year across 50 countries found that, in total, 48% of cybercrime events involved browser activity. Individuals trying to connect to the web, including business employees, are exposed to cyberthreats on a daily basis.
Information security
Information security
fromSecurityWeek
2 months ago

Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign

Over 150 coordinated cloned law-firm websites impersonate firms to re-victimize fraud victims by offering free asset recovery and evading takedowns.
Information security
fromTheregister
2 months ago

Crims hit the easy button for IT helpdesk scams

Custom voice-phishing kits sold on dark-web channels enable attackers to spoof authentication flows, intercept credentials and MFA codes, and orchestrate live helpdesk social-engineering.
Information security
fromArs Technica
2 months ago

There's a rash of scam spam coming from a real Microsoft address

The legitimate Microsoft Power BI address no-reply-powerbi@microsoft.com is being abused to send scam emails that prompt victims to call numbers and install remote-access software.
[ Load more ]