Phishers who hit Twilio and Cloudflare stole 10k credentials from 136 others
Already regarded among the most advanced, the attacks were also done at a massive scale. Enlarge / This is definitely not a Razer mouse—but you get the idea. (credit: calvio via Getty Images) Two weeks ago, Twilio and Cloudf.....»»
Don"t click on that Twilio message - it could be a scam
Twilio was compromised, and users are being targeted with phishing emails......»»
Phishing campaign targets Coinbase wallet holders to steal cryptocurrency in real-time
In this video for Help Net Security, Nick Ascoli, VP of Threat Research, PIXM, discusses a multilayered phishing campaign targeting cryptocurrency exchange Coinbase. Attackers are sending out spoofed Coinbase emails to harvest personal credentials an.....»»
Phishers use custom phishing kit to hijack MFA-protected enterprise Microsoft accounts
An ongoing, large-scale phishing campaign is targeting owners of business email accounts at companies in the FinTech, Lending, Insurance, Energy and Manufacturing sectors in the US, UK, New Zealand and Australia, Zscaler researchers are warning. The.....»»
Unlocking T-Mobile phones using stolen credentials netted $25M
A former cellphone store owner made an estimated $25M by unlocking T-Mobile phones using stolen credentials. He now faces a possible prison sentence of up to 165 years … more… The post Unlocking T-Mobile phones using stolen credentials netted.....»»
Hackers stole passwords from 140,000 payment terminals using malware
The Android-based payment system, Wiseasy has experienced a data breach that has allowed hackers to gain control of thousands of its payment terminals......»»
The most impersonated brand in phishing attacks? Microsoft
Vade announced its H1 2022 Phishers’ Favorites report, a ranking of the top 25 most impersonated brands in phishing attacks. Microsoft came in at #1 on the list, followed by Facebook. Rounding out the top five are Crédit Agricole, WhatsApp, and Or.....»»
Personal data of 69 million Neopets users is now up for sale after a data breach
A hacker managed to break into the Neopets database and allegedly stole the data of up to 69 million users as well as the website's source code......»»
Court Orders Cloudflare’s DNS Resolver 1.1.1.1 to Block Pirate Sites in Italy
An Italian court has ordered Cloudflare to block three torrent sites on its public DNS resolver 1.1.1.1. The anti-piracy measures were requested by local music industry group FIMI and anti-piracy group FPM. This is the first time that Cloudflare DNS.....»»
Product showcase: Passwork – the best solution for work with corporate passwords
Passwork aims to enable efficient and secure working processes through the automated management of passwords and corporate accounts. Quickly access all employee credentials. Local system administrators are tasked with monitoring and controlling emplo.....»»
Taiwan authorities charge Apple supplier Luxshare with corporate espionage
Investigators in Taiwan claim that Luxshare, one of Apple's major manufacturers, lured away staff from rivals and stole company secrets.Luxshare has been investing in new iPhone assembly facilities, and production factories for wearables and electric.....»»
PayPal-themed phishing kit allows complete identity theft
Sometimes phishers are just after your username and password, but other times they are after every scrap of sensitive information they can extract from you. To do that, they use tools like the phishing kit recently analyzed by Akamai researchers. By.....»»
Broadest US Pirate Site Injunction Rewritten/Tamed By Cloudflare
After causing outrage among online services including Cloudflare, the most aggressive pirate site injunction ever handed down in the US has undergone significant weight loss surgery. Now before the court is a heavily modified injunction that is most.....»»
Phishers steal Office 365 users’ session cookies to bypass MFA, commit payment fraud
A massive phishing campaign has been targeting Office 365 (i.e., Microsoft 365) users in over 10,000 organizations since September 2021 and successfully bypassing multi-factor authentication (MFA) set up to protect the accounts. The attackers use pro.....»»
What Happened to the Teen Who Stole $23.8M in Cryptocurrency?
15-year-old Ellis Pinsky stole $23.8 million worth of cryptocurrency — and his life was never the same. For example, Rolling Stone reports, in his last year of high school, "Four men wearing ski masks and gloves, armed with knives, rope, brass.....»»
Escooter Rentals Aren’t as Green as You Think
Dubious design and inefficient operations are just some of the reasons why shared scooters’ eco-credentials are thin......»»
E-Scooter Rentals Aren’t as Green as You Think
Dubious design and inefficient operations are just some of the reasons why shared scooters’ eco-credentials are thin......»»
Broadest US Pirate Site Injunction Rewritten/Tamed By Cloudflare
An anonymous reader quotes a report from TorrentFreak: After causing outrage among online services including Cloudflare, the most aggressive pirate site injunction ever handed down in the US has undergone significant weight loss surgery. Now before t.....»»
How a cyber asset management strategy can help enterprises detect threats
Whether it’s through stolen credentials, phishing attacks, or simply user errors, people continue to pose the greatest risk to cybersecurity. While behavioral attacks are nothing new, Verizon’s recently released Data Breach Investigations Report.....»»
YouTube content creator credentials are under siege by YTStealer malware
Researchers unearth suspected credential-stealer service targeting YouTubers. Enlarge (credit: Getty Images) In online crime forums, specialization is everything. Enter YTStealer, a new piece of malware that steals authenticat.....»»
Python packages with malicious code expose secret AWS credentials
Sonatype researchers have discovered Python packages that contain malicious code that peek into and expose secret AWS credentials, network interface information, and environment variables. All those credentials and metadata then get uploaded to one o.....»»