Marketing techfromTheregister1 month agoDon't click on that Facebook ad for a text-to-AI-video toolUNC6032 exploits AI video generator interest, using malicious ads to steal sensitive information.
Privacy professionalsfromTheregister2 months agoOpen source text editor poisoned to target Uyghur usersThe phishing campaign demonstrates China's persistent targeting of Uyghur individuals abroad.
Information securityfromSecuritymagazine1 month agoResearch Tracked 1 Malicious Email Every 42 Seconds in 2024Phishing threats are evolving rapidly, outpacing security teams' responses.Email scams and sophisticated malware attacks are on the rise, posing significant challenges for cybersecurity.
Growth hackingfromTechzine Global2 months agoHackers exploit OAuth 2.0 workflows to hijack accountsRussian hackers exploit OAuth 2.0 to gain unauthorized access to Microsoft 365 accounts of organizations connected to Ukraine.
Artificial intelligencefromHackernoon1 month agoAI-Assisted Cyber Attack Methods That Could Cripple Your Business | HackerNoonAI is transforming both cyber threats and security measures, increasing risks and capabilities of attackers.
Information securityfromSecuritymagazine2 months ago94% of Fortune 50 Companies Have Employee Identity Data Exposed by Phishing AttacksPhishing attacks are increasing in scale and complexity, impacting major companies disproportionately.A vast majority of exposed employee data includes critical identifiers such as email and IP addresses.
Marketing techfromTheregister1 month agoDon't click on that Facebook ad for a text-to-AI-video toolUNC6032 exploits AI video generator interest, using malicious ads to steal sensitive information.
Privacy professionalsfromTheregister2 months agoOpen source text editor poisoned to target Uyghur usersThe phishing campaign demonstrates China's persistent targeting of Uyghur individuals abroad.
Information securityfromSecuritymagazine1 month agoResearch Tracked 1 Malicious Email Every 42 Seconds in 2024Phishing threats are evolving rapidly, outpacing security teams' responses.Email scams and sophisticated malware attacks are on the rise, posing significant challenges for cybersecurity.
Growth hackingfromTechzine Global2 months agoHackers exploit OAuth 2.0 workflows to hijack accountsRussian hackers exploit OAuth 2.0 to gain unauthorized access to Microsoft 365 accounts of organizations connected to Ukraine.
Artificial intelligencefromHackernoon1 month agoAI-Assisted Cyber Attack Methods That Could Cripple Your Business | HackerNoonAI is transforming both cyber threats and security measures, increasing risks and capabilities of attackers.
Information securityfromSecuritymagazine2 months ago94% of Fortune 50 Companies Have Employee Identity Data Exposed by Phishing AttacksPhishing attacks are increasing in scale and complexity, impacting major companies disproportionately.A vast majority of exposed employee data includes critical identifiers such as email and IP addresses.
fromComputerWeekly.com1 month agoInformation securityHMRC phishing breach wholly avoidable, but hard to stop | Computer Weekly
fromIT Pro1 day agoPrivacy professionalsArrests made after huge HMRC scam campaign hit 100,000 accounts
fromComputerWeekly.com1 month agoInformation securityHMRC phishing breach wholly avoidable, but hard to stop | Computer Weekly
fromIT Pro1 day agoPrivacy professionalsArrests made after huge HMRC scam campaign hit 100,000 accounts
fromMail Online2 weeks agoToronto startupSinister new scam sweeps US as baby-faced criminals steal thousands
fromMail Online2 weeks agoToronto startupSinister new scam sweeps US as baby-faced criminals steal thousands
fromTechzine Global1 month agoMicrosoft makes Outlook safer with more attachment blockingStarting in July, Microsoft will block .library-ms and .search-ms file types in Outlook to mitigate phishing risks and vulnerabilities associated with these file types.Information security
UK politicsfromBusiness Matters1 month agoHMRC scammers stole 47m in phishing fraud targeting 100,000 taxpayer accountsScammers exploited over 100,000 taxpayer accounts to steal £47 million from HMRC using sophisticated identity theft and phishing techniques.
Artificial intelligencefromwww.scientificamerican.com2 months agoCriminal AI is HereAnd Anyone Can SubscribeXanthorox is an AI tool designed for criminal use, enabling deepfakes and phishing attacks with remarkable accessibility.
fromwww.theguardian.com2 months agoPrivacy professionalsHello pervert': the sextortion scam claiming to have videoed you
fromDatabreaches1 month agoNon-profit organizationsFresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
Artificial intelligencefromwww.scientificamerican.com2 months agoCriminal AI is HereAnd Anyone Can SubscribeXanthorox is an AI tool designed for criminal use, enabling deepfakes and phishing attacks with remarkable accessibility.
fromwww.theguardian.com2 months agoPrivacy professionalsHello pervert': the sextortion scam claiming to have videoed you
fromDatabreaches1 month agoNon-profit organizationsFresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.