Advertisements


Flipping the BEC funnel: Phishing in the age of GenAI

For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic (and usually poorly-written) email and fire it out to thousands of recipients in the hope that a few might take the bait. Over time, however, as s.....»»

Category: securitySource:  netsecurityJan 15th, 2024

Your Steam account could be in danger because of this new phishing technique

Hackers found a clever new way to hack Steam accounts. Here's how to make sure that you're staying safe......»»

Category: topSource:  digitaltrendsRelated NewsSep 13th, 2022

Watch out - that WeTransfer link could be a phishing scam

New phishing campaign abuses a legitimate WeTransfer file-sharinh service to distribute a potent trojan......»»

Category: topSource:  marketingvoxRelated NewsSep 13th, 2022

Hackers can now sneak malware into the GIFs you share

This new attack uses Microsoft Teams and GIFs to mount phishing attacks on your computer......»»

Category: topSource:  digitaltrendsRelated NewsSep 9th, 2022

EvilProxy phishing-as-a-service with MFA bypass emerged on the dark web

Following the recent Twilio hack leading to the leakage of 2FA (OTP) codes, cybercriminals continue to upgrade their attack arsenal to orchestrate advanced phishing campaigns targeting users worldwide. Resecurity has recently identified a new Phishin.....»»

Category: securitySource:  netsecurityRelated NewsSep 6th, 2022

Apple won"t call to ask you to tell them a code you get on your iPhone

A tech YouTube personality was recently the target of an attempted phishing attack, recounting on Twitter how a phone caller impersonated Apple to try and gain access to his iCloud account.Like many other big companies, Apple's services has become a.....»»

Category: appleSource:  appleinsiderRelated NewsSep 4th, 2022

YouTuber avoids becoming a victim to an iCloud phishing phone call

A tech YouTube personality was recently the target of an attempted phishing attack, recounting on Twitter how a phone caller impersonated Apple to try and gain access to his iCloud account.Like many other big companies, Apple's services has become a.....»»

Category: appleSource:  appleinsiderRelated NewsSep 4th, 2022

More PyPl packages hacked following phishing attack

Package maintainers gave away login credentials, which were then used to taint packages with malicious code......»»

Category: topSource:  theglobeandmailRelated NewsAug 26th, 2022

Phishing PyPI users: Attackers compromise legitimate projects to push malware

PyPI, the official third-party software repository for Python packages, is warning about a phishing campaign targeting its users. “We have additionally determined that some maintainers of legitimate projects have been compromised, and malware p.....»»

Category: securitySource:  netsecurityRelated NewsAug 25th, 2022

0ktapus: Twilio, Cloudflare phishers targeted 130+ organizations

Group-IB has discovered that the recently disclosed phishing attacks on the employees of Twilio and Cloudflare were part of the massive phishing campaign that resulted in 9,931 accounts of over 130 organizations being compromised. The campaign was co.....»»

Category: securitySource:  netsecurityRelated NewsAug 25th, 2022

ReasonLabs Online Browser Security protects consumers from complex and rapidly-evolving cyber threats

ReasonLabs has launched its newest product, Online Browser Security. The product provides real-time, 24/7 protection against malicious URLs, phishing, harmful extensions, suspicious downloads, intrusive cookies and trackers, unauthorized notification.....»»

Category: securitySource:  netsecurityRelated NewsAug 25th, 2022

SaaS platforms are facing more phishing attacks than ever

SaaS platforms prove the perfect weapon, as they're legitimate tools that bypass most security measures......»»

Category: topSource:  marketingvoxRelated NewsAug 24th, 2022

New social engineering tactics discovered in the wild

In this Help Net Security video, Otavio Freire, President and CTO at SafeGuard Cyber, offers insight on new social engineering tactics discovered in the wild, and illustrates how phishing attacks are changing, including how they’re evolving bey.....»»

Category: securitySource:  netsecurityRelated NewsAug 24th, 2022

Credential phishing attacks rise and represent a huge threat to businesses

Abnormal Security released a report which explores the current email threat landscape. This Help Net Security video provides insight into the latest advanced email attack trends. The post Credential phishing attacks rise and represent a huge threat t.....»»

Category: securitySource:  netsecurityRelated NewsAug 23rd, 2022

Signal says hundreds of users may have been hit in phishing attack

Messaging app Signal urges users to re-register app to avoid potential attacks.....»»

Category: topSource:  informationweekRelated NewsAug 16th, 2022

Signal privacy: Twilio phishing attack exposed some phone numbers, but no other data

A phishing attack on communications giant Twilio led to a Signal privacy compromise for around 1,900 users. Their phone numbers were exposed, along with SMS verification codes that would allow an attacker to register accounts to a new device … mo.....»»

Category: topSource:  informationweekRelated NewsAug 16th, 2022

1,900 Signal users’ phone numbers exposed by Twilio phishing

No message, profile, or other data exposed—but SMS remains a weakness. Enlarge / Signal's security-minded messaging app is dealing with a third-party phishing attempt that exposed a small number of users' phone numbers. (credit: Gett.....»»

Category: topSource:  arstechnicaRelated NewsAug 15th, 2022

Credential phishing attacks skyrocketing, 265 brands impersonated in H1 2022

Abnormal Security released a which report explores the current email threat landscape and provides insight into the latest advanced email attack trends, including increases in business email compromise, the evolution of financial supply chain comprom.....»»

Category: securitySource:  netsecurityRelated NewsAug 15th, 2022

How bad actors are utilizing the InterPlanetary File Systems (IPFS)

With the continued rise in adoption of cloud services, bad actors are utilizing the InterPlanetary File System (IPFS) as a new playing ground for phishing attacks. In fact, Trustwave SpiderLabs has found that in the past 90 days, more than 3,000 emai.....»»

Category: securitySource:  netsecurityRelated NewsAug 12th, 2022

I’m a security reporter and got fooled by a blatant phish

Think you're too smart to be fooled by a phisher? Think again. Enlarge / This is definitely not a Razer mouse—but you get the idea. (credit: calvio via Getty Images) There has been a recent flurry of phishing attacks so surg.....»»

Category: topSource:  arstechnicaRelated NewsAug 11th, 2022

IRONSCALES Security Awareness Training educates users about phishing attacks

IRONSCALES has launched the addition of new advanced Security Awareness Training to help customers better educate their employees on how to spot phishing attacks, improve their overall security knowledge, and learn about multiple industry compliance.....»»

Category: securitySource:  netsecurityRelated NewsAug 11th, 2022