The attackers targeted the entire globe, without any exceptions.
Since April of this year, millions of phishing emails have been sent through the Phorpiex botnet as part of a large-scale campaign using the LockBit Black ransomware. The New Jersey Cybersecurity and Communications Integration...
Vaccination, tourism, cryptocurrency investments, major sports events, movie news, and subscriptions to popular services are among the top topics that are most actively exploited in phishing attacks according to Positive Technologies. You can find out which cyber fraud schemes have become the...
How holidays and trustfulness of citizens affect the activity of scammers.
Despite an extensive information campaign and warnings, fraudulent schemes that mimic the services of the postal service continue to operate successfully. Akamai found a significant increase in the activity of such...
The Prosecutor General's Office has sent a criminal case to the court against six Homel residents who were charged with embezzlement of property by modifying computer information as part of an organized group, BelTA has learned from the Department for Media Relations and Editorial Activities of...
How did the invoice go viral and why did emails become so dangerous?
According to Trustwave SpiderLabs, a new phishing campaign has hit Latin America, during which Windows systems are infected with viruses through emails.
The attack chain starts with sending out emails with a ZIP file...
The new standards are designed to strengthen protection against spam and phishing.
Google is taking new steps to strengthen the protection of Gmail users from spam and phishing attacks, tightening requirements for senders of mass mailings.
Recently, the company has started automatically...
A nineteen-year-old resident of Lviv, who fraudulently lured out more than 100 thousand hryvnias from citizens, was exposed by operatives of the Department for Countering Cybercrime in the Lviv region, joint investigators of the Police Department No. 1 of the Lviv District Police Department No...
Now it is established about the losses caused to citizens in the amount of almost 119 thousand UAH. Investigators informed the defendants about the suspicion. They face up to 8 years in prison.
The illegal activity was stopped by employees of the Department of Countering Cybercrime in the...
RCS messages - a new loophole for attacks on Android and iPhone users.
Netcraft has discovered a new phishing service called Darcula, which uses more than 20,000 domains to mimic popular brands and steal the credentials of Android and iPhone users in more than 100 countries.
The PHAAS service...
Properly written emails allowed hackers to deploy their tools.
IBM X-Force reports on a series of phishing campaigns by the ITG05 group, during which fake documents are sent on behalf of government and non-governmental organizations in Europe, Transcaucasia, Central Asia, and North and South...
Hello! Everyone knows what phishing is. He has been with us for over 20 years. But now, it seems that phishing has become more accessible than before. This article explains how scammers can benefit from increasing the popularity of phishing service sales in the form of a service.
In this...
Hello! Any carder should have a number of essential items. This is a credit card, good hosting and, of course, a domain. All this will provide the cardboard lover with a cherished second-level name. This article will help you figure it out.
This article will also be useful for ordinary people...
Five attackers obtained bank card data from citizens using phishing links that copied the interface of popular Internet services. 44 people were identified as victims of the actions of intruders. The defendants face up to twelve years behind bars.
The fraudsters were exposed by the cyber police...
The world will have to find out what the new attack technique will lead to.
The information security company Proofpoint discovered that the TA577 group has changed the tactics of its attacks. Hackers are now using phishing emails to steal NT LAN Manager (NTLM) authentication hashes, enabling...
Now you need to be vigilant, even if you go to the sites of federal services.
Lookout reports that the new CryptoChameleon phishing kit has become a tool for attacks on employees of the Federal Communications Commission( FCC), during which the fake Okta authentication system is used.
The...
Employees of the Criminal investigation Department of the Ministry of Internal Affairs of Russia in the Nizhny Novgorod region detained a suspect in fraud under the pretext of collecting money for the restoration of the Orthodox Church of the Assumption of the Blessed Virgin Mary in the village...
Check Point experts have identified a new variant of quishing (phishing with QR codes). A link embedded in the QR code leads to a resource that captures the user's digital fingerprint.Based on the results of verification, it works out a particular redirect.
According to analysts, in August –...
Everyone can now run their own malicious campaign.
Cybersecurity experts draw attention to the" democratization " of the phishing ecosystem due to the transformation of Telegram into the epicenter of cybercrime, which allows attackers to organize mass attacks for relatively little money...
A new threat is gaining momentum in the world of cybersecurity: adaptive phishing campaigns. This method is an evolution of traditional phishing: attackers use a personalized approach to overcome defenses, using information about victims collected from social networks, public sites and past data...
"You have a bonus! Open the file for more details."
Cofense, a company specializing in electronic security, reports an increase in cases of cyber attacks aimed at stealing the credentials of employees of companies. Attackers use New Year's Eve messages about changes in pension accounts, salary...