Identity theft is a significant issue affecting millions yearly, whether through stolen credit card information or fraudulent accounts. It’s a lucrative business for criminals, who can steal billions of dollars annually through these methods. Unfortunately, data breaches are a common occurrence, and they contribute to the problem. While it’s impossible to prevent data breaches, there… Continue reading What Is Identity Theft & How to Protect Against It
Tag: Phishing
W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit
In the ever-evolving landscape of cyber threats, crooks continually find new and inventive ways to exploit vulnerabilities and target valuable assets. One such threat that has recently garnered significant attention is “W3LL.” Next, we will tell you what it is, what it is known for, and how it succeeded in its business over 6 years… Continue reading W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit
Phishing With Hacked Sites Becomes a Massive Menace
Threat actors started using compromised websites for phishing purposes much more frequently. Such worrying statistics popped up in several recent researches. This is not a brand new approach, though it may be particularly effective for fraudulent purposes. Hackers Use Poorly-protected Sites in Phishing Scams Cybercriminals often target abandoned WordPress websites with poor maintenance and security… Continue reading Phishing With Hacked Sites Becomes a Massive Menace
Beware of Cryptocurrency Recovery Scams
Recently, the FBI reported increased scammers posing as companies offering to recover stolen cryptocurrency funds. These cunning intruders assure victims of cryptocurrency investment scams that they can retrieve their funds. Cryptocurrency recovery scams According to the same FBI report, losses from cryptocurrency investment scams officially exceeded $2.5 billion in 2022. However, this is not the… Continue reading Beware of Cryptocurrency Recovery Scams
Back to School Scams Expand As August Begins
As the new school season approaches, scammers target students and their parents. They use social engineering and offer free school kits and discounts to lure potential victims. Thus, back to school scams are gaining momentum. The Season of Back to School Scams Cybersecurity researchers discovered a scam campaign that uses PDF files. Under the guise… Continue reading Back to School Scams Expand As August Begins
Are .zip Domains Safe to Use and Visit?
The Internet has become our second home. Every time we surf the Internet, we scammed. And this time, cybercriminals did not miss their chance to deceive us using a new “.zip” domain. What’s a .zip domain? Some time ago, Google allowed new Top Level Domain (TLD) names for registration. Those are .zip, .mov, and .phd.… Continue reading Are .zip Domains Safe to Use and Visit?
Twitter Blue to X Phishing Breakout
Amid the chaos of Twitter’s transition to the new name – X, scammers have devised yet another deception scheme. They offer Twitter Blue users to transfer their subscriptions to X, but the victim gives the attackers access to their Twitter account instead of moving. Twitter Blue to X Phishing Emails As Twitter’s global rebranding is… Continue reading Twitter Blue to X Phishing Breakout
Bahamut APT Targets Users With Fake SafeChat App
Attackers are using a fake SafeChat Android app to attack users in the South Asian region. The malware is designed to steal call logs, text messages, and GPS locations from targeted smartphones. India’s APT group “Bahamut” is probably behind all this mess. Bahamut Group Exploit Phony Android Application Recently, analysts came over advanced Android malware… Continue reading Bahamut APT Targets Users With Fake SafeChat App
FraudGPT Offers Phishing Email Generation to Cybercriminals
It’s not just IT companies racing to develop AI-powered chatbots. Cybercriminals have also joined the fray. Recent reports indicate that a developer has built a dangerous AI chatbot called “FraudGPT” that enables users to engage in malicious activities. Earlier this month, security experts uncovered a hacker working on WormGPT. Also, the chatbot enables users to… Continue reading FraudGPT Offers Phishing Email Generation to Cybercriminals
Google Creates a Red Team to Attack AI Systems
Google says it is creating a red team that will specialize in “sophisticated technical attacks on AI systems.” Among examples of such attacks, the company’s report lists prompt engineering, extracting information from LLM training data, and so on. In its report, Google highlights the importance of the AI red team, and also lists the different… Continue reading Google Creates a Red Team to Attack AI Systems