Cybercriminals are taking advantage of people’s fears about online dating by getting them to download fake “verification” apps that allow them to steal information and money. The FBI published a warning on Friday about the scam, noting that it was akin to an offshoot of romance scams and pig butchering schemes that have proliferated in […]
A phishing campaign exploiting a bug in Nespresso’s website has been able to evade detection by taking advantage of security tools that fail to look for malicious nested or hidden links. The campaign starts with a phishing email that appears to have been sent from an employee with Bank of America, with a message to […]
Apr 23, 2024NewsroomSpyware / Cyber Espionage The U.S. Department of State on Monday said it’s taking steps to impose visa restrictions on 13 individuals who are allegedly involved in the development and sale of commercial spyware or who are immediately family members of those involved in such businesses. “These individuals have facilitated or derived financial […]
Apr 10, 2024NewsroomSoftware Security / Supply Chain Attack Threat actors are now taking advantage of GitHub’s search functionality to trick unsuspecting users looking for popular repositories into downloading spurious counterparts that serve malware. The latest assault on the open-source software supply chain involves concealing malicious code within Microsoft Visual Code project files that’s designed to […]
The British government has been accused by a parliamentary committee of taking the “ostrich strategy” by burying its head in the sand over the “large and imminent” national cyber threat posed by ransomware. The criticism follows the government publishing on Monday its formal response to a report from the Joint Committee on the National Security […]
The Pennsylvania Courts system has been hit by a cyber-attack, taking down parts of its website. The Administrative Office of Pennsylvania Courts revealed via social media that the service had suffered a denial of service (DoS) attack. The statement noted that court web systems such as PACFile, the use of online docket sheets and the […]
AlphaTheta – Pioneer DJ’s owners and now a brand onto themselves – are taking on low-latency wireless audio. Today they’re introducing the WAVE-EIGHT, a portable wireless DJ speaker that aims to make setting up a party without running cables that much easier. [embedded content] The easiest way to explain the WAVE-EIGHT to DJs who already […]
Jan 03, 2024NewsroomMalware / Data Theft Information stealing malware are actively taking advantage of an undocumented Google OAuth endpoint named MultiLogin to hijack user sessions and allow continuous access to Google services even after a password reset. According to CloudSEK, the critical exploit facilitates session persistence and cookie generation, enabling threat actors to maintain access […]
Scammers are taking advantage of the last-minute rush to order Christmas gifts, with one threat intelligence vendor claiming to have seen a 34% increase in new phishing sites impersonating delivery services. Group-IB said it identified 587 sites designed to look like legitimate postal operators and delivery companies in the first 10 days of December, up […]
- 1
- 2