Social media has become an important aspect of our everyday lives in this age of technology and information. Despite its numerous advantages, social media has raised concerns about protecting personal privacy. In particular, social networks pose a significant danger to information security – and it is mostly unspoken. But is this threat real? And how… Continue reading Information Security Threats in Social Media
Tag: Phishing
Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site
With the ever-increasing number of cyber threats, hackers and cybersecurity specialists are taking the initiative. This time, cybercriminals went ahead of the curve. They created a phishing website to coincide with the news that Microsoft was developing a crypto wallet exclusively for its Edge browser. Such a scheme is used to spread Luca Stealer. Microsoft… Continue reading Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site
Fake Ads on Facebook Promote Scam AI Services
Facebook has been hit by a wave of fake ads that offer what looks like AI services. In fact, those are scam pages that trick people into installing malware. AI Scam in Facebook Ads The use of social media for cybercrime, in general, is nothing new. However, to maintain effectiveness, sometimes fraudsters have to adjust… Continue reading Fake Ads on Facebook Promote Scam AI Services
WormGPT Helps Cybercriminals to Launch Sophisticated Phishing Attacks
SlashNext noticed that cybercriminals are increasingly using generative AI in their phishing attacks, such as the new WormGPT tool. WormGPT is advertised on hacker forums, and it can be used to organize phishing mailings and compromise business mail (Business Email Compromise, BEC). WormGPT Is Massively Used for Phishing WormGPT is based on the GPTJ language… Continue reading WormGPT Helps Cybercriminals to Launch Sophisticated Phishing Attacks
Credentials Theft is On The Rise
Email spam has become the prevalent form of phishing and malware spreading for a long time. Among them, credentials theft remains the most common type – even though it is not the most profitable. Nowadays, these attacks obtained another target – compromising business accounts. But how do they work? And how to protect against credentials… Continue reading Credentials Theft is On The Rise
Cloud Mining Scams Spread Banking Trojans
It’s no secret that cybercriminals are increasingly using mobile platforms as an attack vector lately. One example is a new Android malware. It spreads through fake cloud mining scams services and targets cryptocurrency wallets and online banking apps. Analysts dubbed this banking trojan as Roamer, though hackers may use different other malware for such attacks.… Continue reading Cloud Mining Scams Spread Banking Trojans
Beware of Vacation-Related Scams: 4 Most Prevalent Types
Email scam actors constantly try to pick a better disguise for their fraudulent messages. Summer, the time when people commonly plan to take a break from their jobs and travel, gives a wide range of opportunities to scammers. Vacation-related email scams would be on the rise over the next several months – read on to… Continue reading Beware of Vacation-Related Scams: 4 Most Prevalent Types
Protection Against Instagram Scams: What You Need to Know
Instagram, one of the world’s most popular social media platforms, turns out to be far from secure for its users. Serious security issues often arise, leading to the loss of accounts and personal data. However, the most unpleasant part awaits you ahead. When you try to recover your data, you’ll realize that the support is… Continue reading Protection Against Instagram Scams: What You Need to Know
ChatGPT has become a New tool for Cybercriminals in Social Engineering
Artificial intelligence has become an advanced tool in today’s digital world. It can facilitate many tasks, help solve complex multi-level equations and even write a novel. But like in any other sphere, cybercriminals here have found some profit. With ChatGPT, they can deceive a user correctly and skillfully and thus steal his data. The key… Continue reading ChatGPT has become a New tool for Cybercriminals in Social Engineering
What is Business Email Compromise (BEC) Attack?
Business email compromise attack, or shortly BEC, is a relatively new vector of cyberattacks. Dealing primary damage by exposing potentially sensitive information, it also gives hackers the opportunity to use the email for further attacks. The potential efficiency of these attacks is thrilling, and cybercriminals already apply them to conduct chain attacks. Let’s figure out… Continue reading What is Business Email Compromise (BEC) Attack?