image provided by pixabay

The Dangerous World of SMS Phishing Scams

0
New research looks into SMS phishing operations, outlines the techniques used to collect additional data and identifies the actions law enforcement officials can take...
image provided by pixabay

The FBI Releases Warning of AI Voice Cloning Scams

0
The San Francisco division of the FBI is warning individuals and organizations to be aware of cybercriminals increasingly using artificial intelligence to “conduct sophisticated...
images provided by pixabay

Scammers Bypass Google Ad Checks, Impersonate Real Brands

0
Some users found that when they try to reach a popular website through Google, they click on the ad at the top of the...
image provided by pixabay

Malicious Actors Using YouTube to Distribute Malware

0
Information stealing malware is being delivered on YouTube disguised as pirated software and video game “cracks,” reports cybersecurity firm Proofpoint. This malware (including Vidar, StealC,...
image provided by pixabay

The Phishing Platform Automating Cybercrime

0
Darcula is a new Chinese-language phishing-as-a-service platform with more than 20,000 phishing domains that target organizations in over 100 countries. While the concept of an...
image provided by pixabay

This Malware Is Stealing Your Cookies, With Devastating Consequences

0
Threat actors have a new tactic to access users’ credentials without knowing them already or launching a multi-factor authentication challenge. One of the most common...
image provided by pixabay

German Authorities Bring Down Darknet Marketplace ‘Nemesis Market’

0
The illegal darknet marketplace Nemesis Market, based in Germany and Lithuania, was recently seized by the Frankfurt Main Public Prosecutor’s Office, the Central Office...
images provided by pixabay

Microsoft Claims Adversary Countries are Using Generative AI For Cyber Operations

0
Microsoft claims US adversaries like Iran, North Korea, Russia, and China are beginning to use generative AI to organize offensive cyber operations. The tech giant...
image provided by pixabay

Cybercriminals Create Malicious AI Chatbots

0
Artificial intelligence tools for the general public (ChatGPT, Bard, Dall-E) are being widely used for many everyday tasks, but users with malicious intentions can...
image provided by pixabay

Deep Fakes and Identity Decentralization

0
The growing trend of AI-generated content and deep fakes is making us lose our trust in the internet. Can identity decentralization be the solution?...
image provided by pixabay

New Tech Fights Deepfake Scams with 90% Accuracy

0
Project Mockingbird is computer security company McAfee's latest breakthrough designed to arm consumers against the growing threat of online deepfake scams and was revealed...
Cyber intelligence. image by pixabay

Defensive AI Countering AI-Driven Cyberattacks

0
As threat actors use artificial intelligence to their advantage, it’s essential that organizations evolve along with them to respond to and prevent these threats. One...
image provided by pixabay

Parking App Data Breach Risks Thousands of Users

0
The operator of Europe's largest parking app EasyPark Group was recently a victim of a major data breach that compromised the personal information of...
image provided by pixabay

The Evolving Cybersecurity Landscape in 2024

0
The ever-evolving cybersecurity landscape promises to bring new cyber threat actors, vulnerabilities, and weaknesses to counter, and as technology evolves, so do cyber threat...
image provided by pixabay

Should Students Learn About Phishing? The Rise of Fraud Scams

0
Fraud is one of the most common crimes in the world nowadays, and AI is making it much more widespread and harder to detect....
image provided by pixabay

Thousands of Suspects Arrested as Part of an International Operation Against...

0
The six-month-long Operation HAECHI IV was an international law enforcement effort targeting online financial crime, and it has resulted in nearly 3,500 arrests and...
image provided by pixabay

Using Digital Intelligence Against Criminal Use of AI

0
Nowadays, many malicious elements online use AI to digitally expand their operations, and experts claim that such AI-generated fraud is only expected to worsen. This...
image provided by pixabay

Leaked Nudes and Amateur Hackers – Top Cyber Risks of 2024

0
Cybersecurity researchers investigated conversations between hackers and analyzed trending topics on one of the dark web’s largest hacker forums and compiled a list of...
images provided by pixabay

Today’s Most Common Phishing Scams

0
Various US authorities are alerting the public to common online fraud schemes as part of the “Don’t Click December” campaign. According to Cybernews, the following...
Image provided by pixabay

Personal Data from Hundreds of Schools Leaked- Endangering Minors

0
Close to a million files containing sensitive private information of minors were left completely exposed to anyone on the internet, thus posing a threat...
image provided by pixabay

FBI Warns of New Ransomware Group “Scattered Spider”

0
The FBI is warning organizations of the ransomware group “Scattered Spider” that has for the past year breached dozens of American firms and stolen...
image provided by pixabay

Pro-Hamas Cybergang Develops New and Complex Infection Tactic

0
This threat actor is now using an infection chain based on delivering a new initial access downloader dubbed IronWind, as was observed by cybersecurity...

Latest

Image provided by pixabay

Data Breaches Are Connected to Mass Layoffs, Research

0
A research team from Binghamton University and the State University of New York explains the connection between mass layoffs and data breaches, theorizing that...